To see the other types of publications on this topic, follow the link: MAT Protocol.

Dissertations / Theses on the topic 'MAT Protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'MAT Protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Shah, Munam Ali. "A novel MAC protocol for cognitive radio networks." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/301090.

Full text
Abstract:
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network
APA, Harvard, Vancouver, ISO, and other styles
2

Kulkarni, Santosh B. Umphress David A. Agrawal Prathima. "Synergy MAC a cooperative MAC protocol /." Auburn, Ala, 2009. http://hdl.handle.net/10415/1609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Silva, Pedro Miguel Oliveira da. "MAC protocol for location systems." Master's thesis, Universidade de Aveiro, 2009. http://hdl.handle.net/10773/2082.

Full text
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações<br>Na ultima década as redes de comunicações sem fios sofreram uma evolução sem precedentes, e as suas características particulares potenciaram a sua aplicação em vários contextos. No caso caso específico da localização em ambientes interiores, pretende-se que através de dados recolhidos por um conjunto de sensores sem fios, seja possível detectar com relativa precisão um objecto móvel devidamente identificado. Este tipo de sistemas permitem por exemplo, monitorizar um paciente de risco num hospital, dando informação precisa do seu paradeir
APA, Harvard, Vancouver, ISO, and other styles
4

Longo, Riccardo. "Formal Proofs of Security for Privacy-Preserving Blockchains and other Cryptographic Protocols." Doctoral thesis, Università degli studi di Trento, 2018. https://hdl.handle.net/11572/368971.

Full text
Abstract:
Cryptography is used to protect data and communications. The basic tools are cryptographic primitives, whose security and efficiency are widely studied. But in real-life applications these primitives are not used individually, but combined inside complex protocols. The aim of this thesis is to analyse various cryptographic protocols and assess their security in a formal way. In chapter 1 the concept of formal proofs of security is introduced and the main categorisation of attack scenarios and types of adversary are presented, and the protocols analysed in the thesis are briefly introduced with
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Jing. "A bit-map-assisted energy-efficient MAC scheme for Wireless Sensor Networks." Master's thesis, Mississippi State : Mississippi State University, 2004. http://library.msstate.edu/etd/show.asp?etd=etd-04052004-180146.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.

Full text
Abstract:
Wireless networks are becoming very common due to their advantages such as rapid deployment and support for mobility. In this dissertation, we design and analyze the Medium Access Control (MAC) protocol for two popular wireless networks: Wireless Sensor Networks (WSNs) and Wireless Local Area Networks (WLANs). For WSNs, we design and analyze an energy efficient MAC protocols. Energy efficiency is a key design factor of a MAC protocol for WSNs. Existing preamble-sampling based MAC protocols have large overheads due to their preambles and are inefficient at large wakeup intervals. Synchronous sc
APA, Harvard, Vancouver, ISO, and other styles
7

Majeed, Adnan. "TARMAC timing analysis resilient MAC protocol /." Diss., Online access via UMI:, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Phua, Cheng Tatt Valance. "A communication protocol framework for wireless sensor networks in industrial environments." University of Western Australia. School of Computer Science and Software Engineering, 2009. http://theses.library.uwa.edu.au/adt-WU2009.0179.

Full text
Abstract:
[Truncated abstract] Developing wireless sensor network communication protocols for industrial environments is a challenging task. The wireless channel conditions in industrial environments are harsher as a result of multipath propagation of radio signals within an environment where the mechanics of the surrounding industrial activities often lead to severe small-scale fading effects. The design of network protocols to function in such an environment needs to provide a robust communication platform for the wireless sensor nodes, while optimizing the utilization of the limited node resources av
APA, Harvard, Vancouver, ISO, and other styles
9

Diab, Rana. "HMC-MAC : un protocole MAC hybride et multi-canal pour les réseaux de capteurs sans fil." Thesis, Clermont-Ferrand 2, 2015. http://www.theses.fr/2015CLF22580/document.

Full text
Abstract:
L'utilisation des canaux multiples améliore significativement les performances globales des réseaux de capteurs sans fil (RCSF) en permettant des transmissions parallèles sur plusieurs canaux. Cependant, la mise en place d’un protocole MAC multi-canal dans un réseau multisauts nécessite une méthode efficace d’allocation des canaux pour permettre une coordination entre les nœuds afin de partager les canaux disponibles. Dans cette thèse, nous nous intéressons à la conception d’un protocole MAC multi-canal qui répond aux exigences des applications de collecte de données à haut débit dans un résea
APA, Harvard, Vancouver, ISO, and other styles
10

Michálek, Tomáš. "Vývoj MAC protokolu pro bezdrátové senzorové sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-242186.

Full text
Abstract:
The work focuses on introduction to the topic of wireless sensor networks and brings readers the various aspects of problem solving in these networks. Work is closely focused on the energy performance when communicating between devices on a network and discusses the causes of excessive energy consumption. It also addresses the mechanisms for saving energy and is also engaged today protocols that its contribution to proposing solutions to problems. The author had also proposes an adapted protocol, based on lessons learned from previous theoretical sources.
APA, Harvard, Vancouver, ISO, and other styles
11

Longo, Riccardo. "Formal Proofs of Security for Privacy-Preserving Blockchains and other Cryptographic Protocols." Doctoral thesis, University of Trento, 2018. http://eprints-phd.biblio.unitn.it/2812/1/main-thesis.pdf.

Full text
Abstract:
Cryptography is used to protect data and communications. The basic tools are cryptographic primitives, whose security and efficiency are widely studied. But in real-life applications these primitives are not used individually, but combined inside complex protocols. The aim of this thesis is to analyse various cryptographic protocols and assess their security in a formal way. In chapter 1 the concept of formal proofs of security is introduced and the main categorisation of attack scenarios and types of adversary are presented, and the protocols analysed in the thesis are briefly introduced
APA, Harvard, Vancouver, ISO, and other styles
12

Cheng, Liang. "IEEE 802.15.4 MAC Protocol Study and Improvement." Digital Archive @ GSU, 2007. http://digitalarchive.gsu.edu/cs_diss/25.

Full text
Abstract:
IEEE 802.15.4 is a standard used for low rate personal area networks (PANs). It offers device level connectivity in applications with limited ower and relaxed throughput requirements. Devices with IEEE 802.15.4 technology can be used in many potential applications, such as home networking, industry/environments monitoring, healthcare equipments, etc, due to its extremely low power features. Although the superframe beacons play the key role in synchronizing channel access in IEEE 802.15.4, they are sources for energy inefficiency. This research focuses on exploring how to optimize the beacons
APA, Harvard, Vancouver, ISO, and other styles
13

Brownfield, Michael I. "Energy-efficient Wireless Sensor Network MAC Protocol." Diss., This resource online, 2006. http://scholar.lib.vt.edu/theses/available/etd-04102006-170423/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Balakrishnan, Manikanden, Subah Ramakrishnan, and Hong Huang. "ENERGY-AWARE SENSOR MAC PROTOCOLS." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605793.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California<br>Sensor network applications typically require continuous monitoring of physical phenomena for extended periods of time under severe energy resource constraints. Accordingly, design considerations for sensor Media Access Control (MAC) protocols depart significantly from those of traditional wireless MAC protocols that largely ignore the energy factor. In this paper, we reexamine the design space of wireless sensor MAC protocols and modify IEEE 802.11 Distributed Coordination
APA, Harvard, Vancouver, ISO, and other styles
15

Qureshi, Faisal Fayyaz. "A reliable and energy efficient cognitive radio multichannel MAC protocol for ad-hoc networks." Thesis, University of Bedfordshire, 2014. http://hdl.handle.net/10547/337026.

Full text
Abstract:
Recent research has shown that several spectrum bands are mostly underutilised. To resolve the issue of underutilisation of spectrum bands across the networks, the concept of Cognitive Radio (CR) technology was envisaged. The CR technology allows Secondary Users (SUs) to acquire opportunistic access to large parts of the underutilised spectrum bands on wireless networks. In CR networks, SUs may scan and identify the vacant channels in the wireless spectrum bands and then dynamically tune their receivers to identify vacant channels and transmitters, and commence communication among themselves w
APA, Harvard, Vancouver, ISO, and other styles
16

Bizagwira, Honoré. "Réseaux de capteurs sans fil étendu robuste exploitant des liens atypiques." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22770/document.

Full text
Abstract:
Ce mémoire de thèse se place dans le contexte des applications de surveillance de l’environnement nécessitant des mesures régulières de caractéristiques biologiques ou géo-physiques. Il s’agit par exemple de mesurer la propagation de polluants dans les cours d’eau, de surveiller le développement de bactérie dans des eaux de baignade. Les réseaux de capteurs sans fils (RCsF) apparaissent comme des solutions économiques et fiables pour permettre l’automatisation de la collecte de telles données. Le bon fonctionnement de ces réseaux dépend de la qualité des transmissions radio, ce qui est particu
APA, Harvard, Vancouver, ISO, and other styles
17

Malik, Hassan. "Distributed MAC protocol for full-duplex wireless networks." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/846235/.

Full text
Abstract:
Full-duplex (FD) communication is considered to be a promising technology to address the problem of radio spectrum congestion due to the increasing demand for wireless communication services. This thesis investigates the problem of asymmetric data flow between downlink and uplink in a system with symmetric radio resource allocation, i.e. FD. The aim is to devise a model by exploiting the coupling nature of FD downlink and uplink transmission powers to maximise the downlink data rate while ensuring the quality of service (QoS) of uplink transmission. Whilst the aim is to maximise the spectrum e
APA, Harvard, Vancouver, ISO, and other styles
18

Li, Max Hongming. "Extension on Adaptive MAC Protocol for Space Communications." Digital WPI, 2018. https://digitalcommons.wpi.edu/etd-theses/1275.

Full text
Abstract:
This work devises a novel approach for mitigating the effects of Catastrophic Forgetting in Deep Reinforcement Learning-based cognitive radio engine implementations employed in space communication applications. Previous implementations of cognitive radio space communication systems utilized a moving window- based online learning method, which discards part of its understanding of the environment each time the window is moved. This act of discarding is called Catastrophic Forgetting. This work investigated ways to control the forgetting process in a more systematic manner, both through a recurs
APA, Harvard, Vancouver, ISO, and other styles
19

Tonsing, Christoph Erik. "Energy-efficient MAC protocol for wireless sensor networks." Diss., University of Pretoria, 2008. http://hdl.handle.net/2263/31247.

Full text
Abstract:
A Wireless Sensor Network (WSN) is a collection of tiny devices called sensor nodes which are deployed in an area to be monitored. Each node has one or more sensors with which they can measure the characteristics of their surroundings. In a typical WSN, the data gathered by each node is sent wirelessly through the network from one node to the next towards a central base station. Each node typically has a very limited energy supply. Therefore, in order for WSNs to have acceptable lifetimes, energy efficiency is a design goal that is of utmost importance and must be kept in mind at all levels of
APA, Harvard, Vancouver, ISO, and other styles
20

Tönsing, Christoph Erik. "Energy -efficient MAC protocol for wireless sensor networks." Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-09042008-143948/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Sarraf, Anooshiravan Hashemzadeh. "Asymmetric traffic load modelling for local area networks." Thesis, Manchester Metropolitan University, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.319239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kondareddy, Yogesh Reddy Agrawal Prathima. "MAC and routing protocols for multi-hop cognitive radio networks." Auburn, Ala, 2008. http://repo.lib.auburn.edu/EtdRoot/2008/SUMMER/Electrical_and_Computer_Engineering/Thesis/Kondareddy_Yogesh_18.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Valero, Marco. "Implementing Energy-Saving Improvements to the IEEE 802.15.4 MAC Protocol." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/62.

Full text
Abstract:
IEEE 802.15.4 is a standard designed for low data rate wireless personal area networks (WPANs) intended to provide connectivity to mobile devices. Such devices present considerable storage, energy, and communication constraints. However, they can be used in a variety of applications like home/office automation, environmental control and more. In order to extend the lifetime of the WPAN, we propose some changes to the standard including modifications to the Superframe Guaranteed Time Slot (GTS) distribution which can be optimized to reduce energy consumption. We implemented the proposed improve
APA, Harvard, Vancouver, ISO, and other styles
24

Oruk, Tufan. "Simulation and analysis of a wireless MAC protocol : MACAW /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA320868.

Full text
Abstract:
Thesis (M.S. in Computer Science) Naval Postgraduate School, September 1996.<br>Thesis advisor(s): Gilbert M. Lundy. "September 1996." Includes bibliographical references (p. 73). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
25

Naqvi, Syed Hasan Yousuf. "Multi-channel MAC Protocol for Wireless Real-Time Communication." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-13927.

Full text
Abstract:
Embedded systems have become more complex and it is hard to predict the behavior of networkdue to its dynamic nature. Several devices can interact to perform highly sophisticated real-timetasks while having the demand of interaction and sharing of resources. The interactingcomponents in these systems have strict timing constraints which require time criticalcommunication.We have designed the DCC-EDF protocol for wireless communication using the motivation fromthe research done in optical communication. We have chosen dedicated control channel protocolbecause it does not require time synchroniz
APA, Harvard, Vancouver, ISO, and other styles
26

Jitpanya, Kacha. "IEEE 802.11 MAC protocol performance evaluation in operational environments." Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/6050.

Full text
Abstract:
Approved for public release, distribution is unlimited<br>The IEEE 802.11 MAC protocol is widely used for wireless local area networks. Consequently, it is important to examine the protocol performance in operational environments. This thesis presents a simulation study of the performance of the IEEE 802.11 MAC protocol in multihop, jamming, and mobile node environments. The effects of the request-to-send mechanism and fragmentation in these environments are also studied. The average throughput and delay are obtained from the simulation and these results are then used to analyze the protocol p
APA, Harvard, Vancouver, ISO, and other styles
27

Mudriievskyi, Stanislav [Verfasser]. "Adaptive MAC-Layer Protocol Switching for PLC / Stanislav Mudriievskyi." München : Verlag Dr. Hut, 2017. http://d-nb.info/1139538675/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Johnson, Robert. "MAC protocol performance for ATM cells over a SuperPON." Thesis, Manchester Metropolitan University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jia, Shilou, and Xi Zhou. "DELAY PERFORMANCE OF PR-CFDAMA MAC PROTOCOL VIA SATELLITE." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606714.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada<br>A novel satellite multiple access scheme called PR-CFDAMA (Predictive Request-Combined Free/Demand Assignment Multiple Access) is proposed in this paper. The delay performances between PR-CFDAMA and R-CFDAMA (Round Robin-CFDAMA) scheme were compared by computer simulation. Simulations were carried out with the Interrupted Poisson Process (IPP) and Interrupted Fluid Process (IFP) traffic models. Simulation results demonstrate that comparing with R-CFDAMA scheme, th
APA, Harvard, Vancouver, ISO, and other styles
30

Vieira, José Filipe Morgado. "A random access MAC protocol for MPR satellite networks." Master's thesis, Faculdade de Ciências e Tecnologia, 2013. http://hdl.handle.net/10362/9927.

Full text
Abstract:
Dissertação apresentada para obtenção do Grau de Mestre em Engenharia Electrotécnica e de Computadores, pela Universidade Nova de Lisboa, Faculdade de Ciências e Tecnologia<br>Random access approaches for Low Earth Orbit (LEO) satellite networks are usually incompatible with the Quality of Service (QoS) requirements of multimedia tra c, especially when hand-held devices must operate with very low power. Cross-Layered optimization architectures, combined with Multipacket Reception (MPR)schemes are a good choice to enhance the overall performance of a wireless system. Hybrid Network-assisted
APA, Harvard, Vancouver, ISO, and other styles
31

Ndoye, El Hadji Malick. "Réseaux de capteurs sans fil linéaires : impact de la connectivité et des interférences sur une méthode d'accès basée sur des jetons circulants." Thesis, Clermont-Ferrand 2, 2015. http://www.theses.fr/2015CLF22661/document.

Full text
Abstract:
Dans cette thèse, il s'agit de proposer un protocole MAC qui prend en compte certaines spécificités des réseaux de capteurs sans fil linéaires. Ce protocole MAC est basé sur des jetons circulants qui donnent aux noeuds le droit d’accès au canal de transmission. Nous évaluons à partir de ce protocole l’impact des interférences et de la connectivité sur un réseau linéaire. Cette évaluation nous permet de proposer des techniques de clustering dans un réseau de capteurs sans fil linéaire. Nous supposons d’abord un clustering basé sur une exploitation logique du voisinage des noeuds capteurs. Nous
APA, Harvard, Vancouver, ISO, and other styles
32

Sanz, Gil Roberto. "Contribución al diseño de los niveles físico y MAC/LLC de redes de comunicaciones móviles orientadas a aplicaciones y servicios multimedia." Doctoral thesis, Universidad de Cantabria, 2001. http://hdl.handle.net/10803/10675.

Full text
Abstract:
Esta tesis tiene como objetivo final la propuesta de un protocolo de acceso al medio imbricado con los parámetros de nivel físico que dan soporte a dicho protocolo. Puesto que la propuesta se basa en un esquema TDMA, se eligen como base del análisis los sistemas de segunda generación GSM, TETRA y DECT, a partir de los cuales se extrapolan determinados parámetros a fin de sintonizarlos con los sistemas de tercera generación en su especificación TDMA. Se evalúan dichos sistemas a nivel físico sobre diferentes modelos de canal de propagación y distintas técnicas de compensación implementadas en e
APA, Harvard, Vancouver, ISO, and other styles
33

Katila, Charles Jumaa. "Mac protocols for linear wireless (sensor) networks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7626/.

Full text
Abstract:
Wireless sensor networks (WSNs) consist of a large number of sensor nodes, characterized by low power constraint, limited transmission range and limited computational capabilities [1][2].The cost of these devices is constantly decreasing, making it possible to use a large number of sensor devices in a wide array of commercial, environmental, military, and healthcare fields. Some of these applications involve placing the sensors evenly spaced on a straight line for example in roads, bridges, tunnels, water catchments and water pipelines, city drainages, oil and gas pipelines etc., making a sp
APA, Harvard, Vancouver, ISO, and other styles
34

Alhakami, Wajdi. "Secure MAC protocols for cognitive radio networks." Thesis, University of Bedfordshire, 2016. http://hdl.handle.net/10547/621831.

Full text
Abstract:
With the rapid increase in wireless devices, an effective improvement in the demand of efficient spectrum utilisation for gaining better connectivity is needed. Cognitive Radio (CR) is an emerging technology that exploits the inefficient utilisation of the unused spectrum dynamically. Since spectrum sharing is responsible for coordinating channels’ access for Cognitive Users (CUs), the Common Control Channel (CCC) is one of the existing methods used to exchange the control information between CUs. However, the unique characteristics and parameters of Cognitive Radio Networks (CRNs) present sev
APA, Harvard, Vancouver, ISO, and other styles
35

Koh, Kenneth Johannesen. "Analysis of Key Industrial WSN MAC Protocols." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27346.

Full text
Abstract:
This paper looks at two MAC protocols for wireless sensor networksfor use in industrial applications developed at the Ubicom Lab, at theUniversity of Ulsan. A theoretical comparison of the MAC protocolsare performed to understand more about the benefits and downsidesto both of them, and experimental scenarios to validate the theoreticalanalysis are suggested. Theoretical analysis suggests that BigMAC hasan advantage in environments with high interference and frequent linkbreaks, while I-MAC has an advantage when the network topology isstable.
APA, Harvard, Vancouver, ISO, and other styles
36

Ge, Ye. "QoS provisioning for IEEE 802.11 MAC protocols." Connect to this title online, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1095441321.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2004.<br>Title from first page of PDF file. Document formatted into pages; contains xiii, 97 p.; also includes graphics (some col.). Includes bibliographical references (p. 94-97).
APA, Harvard, Vancouver, ISO, and other styles
37

Lu, Ying. "On TESTGEN, an environment for protocol test sequence generation, and its application to the FDDI MAC protocol." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/30081.

Full text
Abstract:
Test suite generation and selection form important aspects of conformance testing. The test suite generation process is usually tedious and time-consuming. The selection of appropriate test cases with certain fault coverage requires intensive analysis of the protocol. It is difficult to manually generate test suites without errors. The test suite generation process must therefore be automated. This thesis addresses the issues of design and development of the front end of an automatic test suite generation and selection environment named TESTGEN. TESTGEN generates TTCN test suites from the for
APA, Harvard, Vancouver, ISO, and other styles
38

Aby, Affoua Thérèse. "Réseaux de capteurs sans fil étendus dédiés aux collectes de données environnementales." Thesis, Clermont-Ferrand 2, 2016. http://www.theses.fr/2016CLF22671/document.

Full text
Abstract:
Les réseaux de capteurs sans fil sont utilisés dans de nombreuses applications de surveillance de l’environnement (par exemple, pour surveiller les volcans ou pour détecter les incendies de forêts). Dans de telles applications, les nœuds capteurs disposent d’une quantité limitée d’énergie, mais doivent fonctionner pendant des années sans avoir leurs batteries changées. La principale méthode utilisée pour permettre aux nœuds d’économiser leur énergie est de séquencer les périodes d’activité et d’inactivité. Cependant, la conception de protocoles MAC et de routage pour les applications avec des
APA, Harvard, Vancouver, ISO, and other styles
39

Yuxiang, Yang, Dang Xiaoyu, and Zhou Tingxian. "PROPOSAL OF POLLED-CSMA PROTOCOL FOR AN AD HOC SCADA SYSTEM." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/606484.

Full text
Abstract:
International Telemetering Conference Proceedings / October 23-26, 2000 / Town & Country Hotel and Conference Center, San Diego, California<br>In this paper we introduce an ad hoc distributed supervisory control and data acquisition (SCADA) system, which covers two types of traffic, a small number of slave stations with stream traffic and much larger number of slave stations with burst traffic. To improve the system’s real-time transmission and channel allocation efficiency, a MAC scheme, named Polled-CSMA, is designed by integrating the merits of polling and CSMA protocols. Extensive anal
APA, Harvard, Vancouver, ISO, and other styles
40

Rodrigues, Luciana Falci Theza. "Nascentes de Mata Atlântica: panorama e ecologia da fauna de Oligochaeta (Annelida) e implicações para conservação." Universidade Federal de Juiz de Fora (UFJF), 2018. https://repositorio.ufjf.br/jspui/handle/ufjf/7120.

Full text
Abstract:
Submitted by Geandra Rodrigues (geandrar@gmail.com) on 2018-08-03T18:49:28Z No. of bitstreams: 1 lucianafalcithezarodrigues.pdf: 3964261 bytes, checksum: cb17da68fd27c92d62f0ac63bc4f1365 (MD5)<br>Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2018-08-28T13:49:14Z (GMT) No. of bitstreams: 1 lucianafalcithezarodrigues.pdf: 3964261 bytes, checksum: cb17da68fd27c92d62f0ac63bc4f1365 (MD5)<br>Made available in DSpace on 2018-08-28T13:49:14Z (GMT). No. of bitstreams: 1 lucianafalcithezarodrigues.pdf: 3964261 bytes, checksum: cb17da68fd27c92d62f0ac63bc4f1365 (MD5
APA, Harvard, Vancouver, ISO, and other styles
41

Nasrallah, Yamen. "Energy-Efficient Battery-Aware MAC protocol for Wireless Sensor Networks." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/22656.

Full text
Abstract:
Wireless sensor networks suffer from limited power resources. Therefore, managing the energy constraints and exploring new ways to minimize the power consumption during the operation of the nodes are critical issues. Conventional MAC protocols deal with this problem without considering the internal properties of the sensor nodes’ batteries. However, recent studies about battery modeling and behaviour showed that the pulsed discharge mechanism and the charge recovery effect may have a significant impact on wireless communication in terms of power saving. In this thesis we propose two battery-aw
APA, Harvard, Vancouver, ISO, and other styles
42

Lavassani, Mehrzad. "A Deterministic MAC Protocol to Handle Emergency Traffic in IWSN." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-26866.

Full text
Abstract:
Characteristic driven benets of wireless sensor networks increased the tendency of applying this technology in industrial automation systems. While WSN is a low cost and easy maintenance solution for the current wired systems, it also introduces some challenges to design and development of protocols suitable for industrial environment. Some of essential requirements of industrial automation systems are reliability and real-time communication. Wireless communication on the other hand, essentially cannot offer any guarantee on timely or reliable delivery of data specially considering harsh indus
APA, Harvard, Vancouver, ISO, and other styles
43

Marrapu, Nikhil. "Cluster-based energy-efficient MAC protocol for wireless sensor networks." Thesis, Wichita State University, 2010. http://hdl.handle.net/10057/3734.

Full text
Abstract:
TheWireless Sensor Networks (WSNs) employs thousands of small sensors that communicate between themselves in a distributed manner using Medium Access Control (MAC) protocols. The energy required for wireless sensors is obtained from non-rechargeable energy sources. Due to their small size, wireless sensors are highly constrained in terms of battery energy. Hence, energy efficiency is considered a key factor in the design of a WSN. MAC protocols play an important role in the successful operation of WSNs. Energy efficiency can be achieved by introducing some significant changes that effect the e
APA, Harvard, Vancouver, ISO, and other styles
44

"Deployment study of drama access protocol for systems operating in tdd mode." Tese, MAXWELL, 2002. http://www.maxwell.lambda.ele.puc-rio.br/cgi-bin/db2www/PRG_0991.D2W/SHOW?Cont=2532:pt&Mat=&Sys=&Nr=&Fun=&CdLinPrg=pt.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, Yi-Sheng. "Hybrid token-CDMA MAC protocol for wireless networks." Thesis, 2009. http://hdl.handle.net/10413/819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Mahlaba, Simon Bonginkosi. "A MAC protocol for IP-based CDMA wireless networks." Thesis, 2005. http://hdl.handle.net/10413/2772.

Full text
Abstract:
The evolution of the intemet protocol (IP) to offer quality of service (QoS) makes it a suitable core network protocol for next generation networks (NGN). The QoS features incorporated to IP will enable future lP-based wireless networks to meet QoS requirements of various multimedia traffic. The Differentiated Service (Diffserv) Architecture is a promising QoS technology due to its scalability which arises from traffic flow aggregates. For this reason, in this dissertation a network infrastructure based on DiffServ is assumed. This architecture provides assured service (AS) and premium servi
APA, Harvard, Vancouver, ISO, and other styles
47

Tunc, Muharrem Ali Cetinkaya Coskun. "Service differentiation via cooperative MAC protocol (SD-MAC)." Diss., 2005. http://il.proquest.com/products_umi/dissertations.

Full text
Abstract:
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.<br>"December 2005." Title from PDF title page (viewed on April 19, 2007). Thesis adviser: Coscun Cetinkaya. UMI Number: AAT 1436584 Includes bibliographic references (leaves 57-60).
APA, Harvard, Vancouver, ISO, and other styles
48

Tunc, Muharrem Ali. "Service differentiation via cooperative MAC protocol (SD-MAC)." Thesis, 2005. http://hdl.handle.net/10057/774.

Full text
Abstract:
With the recent advances in wireless communications and networking area, it has been a great challenge for researchers to improve a medium access protocol for providing an efficient service differentiation in wireless ad hoc, sensor and wireless Local Area Networks among different priority class applications that require high goodput, short term fairness, low delay and delay jitter. IEEE 802.11 Static MAC protocol assigns different Arbitration Inter Frame Space (AIFS) durations for different priority classes to provide service differentiation. However, it is subject to a significant goodput de
APA, Harvard, Vancouver, ISO, and other styles
49

Watwe, Siddharth P. "Efficient Schemes for Improving the Performance of Clock Synchronization Protocols in Wireless Sensor Networks Using TDMA- based MAC Protocols." Thesis, 2015. http://etd.iisc.ac.in/handle/2005/3550.

Full text
Abstract:
Clock synchronization in a wireless sensor network (WSN) is essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using carrier sense multiple access (CSMA) for media access. The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions which results in message losses and affects the synchronization accuracy. Since the nodes in a WSN have limite
APA, Harvard, Vancouver, ISO, and other styles
50

Watwe, Siddharth P. "Efficient Schemes for Improving the Performance of Clock Synchronization Protocols in Wireless Sensor Networks Using TDMA- based MAC Protocols." Thesis, 2015. http://etd.iisc.ernet.in/2005/3550.

Full text
Abstract:
Clock synchronization in a wireless sensor network (WSN) is essential as it provides a consistent and a coherent time frame for all the nodes across the network. Typically, clock synchronization is achieved by message passing using carrier sense multiple access (CSMA) for media access. The nodes try to synchronize with each other, by sending synchronization request messages. If many nodes try to send messages simultaneously, contention-based schemes cannot efficiently avoid collisions which results in message losses and affects the synchronization accuracy. Since the nodes in a WSN have limite
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!