Academic literature on the topic 'Medium access control'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Medium access control.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Medium access control"

1

Litwin, L. "The medium access control sublayer." IEEE Potentials 20, no. 4 (2001): 30–34. http://dx.doi.org/10.1109/45.969594.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bodas, Shreeshankar, Devavrat Shah, and Damon Wischik. "Congestion control meets medium access." ACM SIGMETRICS Performance Evaluation Review 40, no. 1 (June 7, 2012): 399–400. http://dx.doi.org/10.1145/2318857.2254812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gummalla, Ajay Chandra V., and John O. Limb. "Wireless medium access control protocols." IEEE Communications Surveys & Tutorials 3, no. 2 (2000): 2–15. http://dx.doi.org/10.1109/comst.2000.5340799.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lijun Chen, S. H. Low, and J. C. Doyle. "Random Access Game and Medium Access Control Design." IEEE/ACM Transactions on Networking 18, no. 4 (August 2010): 1303–16. http://dx.doi.org/10.1109/tnet.2010.2041066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Park, Jaeok, and Mihaela van der Schaar. "Medium Access Control Protocols With Memory." IEEE/ACM Transactions on Networking 18, no. 6 (December 2010): 1921–34. http://dx.doi.org/10.1109/tnet.2010.2050699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Miao, Guowang, Ye Li, and Ananthram Swami. "Channel-Aware Distributed Medium Access Control." IEEE/ACM Transactions on Networking 20, no. 4 (August 2012): 1290–303. http://dx.doi.org/10.1109/tnet.2011.2177473.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Lutz, Jonathan, Charles J. Colbourn, and Violet R. Syrotiuk. "Topological Persistence for Medium Access Control." IEEE Transactions on Mobile Computing 12, no. 8 (August 2013): 1598–612. http://dx.doi.org/10.1109/tmc.2012.134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Silvestre, Daniel, Joao P. Hespanha, and Carlos Silvestre. "Resilient Desynchronization for Decentralized Medium Access Control." IEEE Control Systems Letters 5, no. 3 (July 2021): 803–8. http://dx.doi.org/10.1109/lcsys.2020.3005819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Beghdad, Rachid. "Improving the Profibus medium access control protocol." Journal Européen des Systèmes Automatisés 40, no. 8 (October 30, 2006): 867–83. http://dx.doi.org/10.3166/jesa.40.867-883.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chae, Yohan, and Younggoo Kwon. "Traffic adaptive IEEE 802.15.4 medium access control." International Journal of Pervasive Computing and Communications 4, no. 2 (June 27, 2008): 198–212. http://dx.doi.org/10.1108/17427370810890382.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Medium access control"

1

Klöck, Clemens. "Auction-based Medium Access Control." [S.l. : s.n.], 2007. http://digbib.ubka.uni-karlsruhe.de/volltexte/1000007323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pan, Su, and 潘甦. "Medium access control in packet CDMA systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31245870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cavallero, Sara. "Medium Access Control Protocols for Terahertz Communication." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021.

Find full text
Abstract:
This thesis proposes and studies a Medium Access Control (MAC) protocol for networks of tags deployed over an industrial machine using THz communications. Despite the great advantages of these frequencies, there are drawbacks that cannot be ignored, such as propagation delays that, even at small distances, are of the same order of magnitude as packet transmission times. For this reason, the mathematical models developed for Contention-Free and Contention-Based protocols take into account the propagation delay. The main focus of this thesis is on the CSMA/CA protocol, which introduces channel sensing to reduce collisions and increase performance. The performance of the protocol are compared with two benchmarks, based on Polling and Aloha, considering an industrial machine scenario and accounting for physical and MAC layers features.
APA, Harvard, Vancouver, ISO, and other styles
4

Roman, Alexandru Bogdan. "Scalable cross-layer wireless medium access control." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609506.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bian, Kaigui. "Medium Access Control in Cognitive Radio Networks." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/37591.

Full text
Abstract:
Cognitive radio (CR) is seen as one of the enabling technologies for realizing a new regulatory spectrum management paradigm, viz. opportunistic spectrum sharing (OSS). In the OSS paradigm, unlicensed users (a.k.a. secondary users) opportunistically operate in fallow licensed spectrum on a non-interference basis to licensed users (a.k.a. incumbent or primary users). Incumbent users have absolute priority in licensed bands, and secondary users must vacate the channel where incumbent user signals are detected. A CR network is composed of secondary users equipped with CRs and it can coexist with incumbent users in licensed bands under the OSS paradigm. The coexistence between incumbent users and secondary users is referred to as incumbent coexistence, and the coexistence between CR networks of the same type is referred to as self-coexistence. In this dissertation, we address three coexistence-related problems at the medium access control (MAC) layer in CR networks: (1) the rendezvous (control channel) establishment problem, (2) the channel assignment problem in an ad hoc CR network, and (3) the spectrum sharing problem between infrastructure-based CR networks, i.e., the 802.22 wireless regional area networks (WRANs). Existing MAC layer protocols in conventional wireless networks fail to adequately address the key issues concerning incumbent and self coexistence that emerge in CR networks. To solve the rendezvous establishment problem, we present a systematic approach, based on quorum systems, for designing channel hopping protocols that ensure a pair of CRs to "rendezvous" within an upper-bounded time over a common channel that is free of incumbent user signals. In a single radio interface, ad hoc CR network, we propose a distributed channel assignment scheme that assigns channels at the granularity of "segments" for minimizing the channel switching overhead. By taking into account the coexistence requirements, we propose an inter-network spectrum sharing protocol that enables the sharing of vacant TV white space among coexisting WRANs. Our analytical and simulation results show that these proposed schemes can effectively address the aforementioned MAC layer coexistence problems in CR networks.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
6

Ben, Khalifa Abderrahman. "Medium access control layer for dedicated IoT networks." Thesis, Lyon, 2020. http://www.theses.fr/2020LYSEI063.

Full text
Abstract:
Les réseaux dédiés pour l’Internet des Objets sont apparus avec la promesse de connecter des milliers de nœuds, voire plus, à une seule station de base dans une topologie en étoile. Cette nouvelle logique représente un changement fondamental dans la façon de penser les réseaux, après des décennies pendant lesquelles les travaux de recherche se sont focalisés sur les réseaux multi-sauts. Les réseaux pour l’Internet des Objets se caractérisent par la longue portée des transmissions, la vaste couverture géographique, une faible consommation d’énergie et un bas coût de mise en place. Cela a rendu nécessaire des adaptations à tous les niveaux protocolaires afin de satisfaire les besoins de ces réseaux. Plusieurs acteurs sont en concurrence sur le marché de l’Internet des Objets, essayant chacun d’établir la solution la plus efficiente. Ces acteurs se sont concentrés sur la modification de la couche physique, soit au niveau de la partie matérielle, soit par la proposition de nouvelles techniques de modulation. Toutefois, en ce qui concerne la solution de contrôle d’accès au canal (connue sous le nom de couche MAC), toutes les solutions proposées par ces acteurs se fondent sur des approches classiques, tel que Aloha et CSMA. L'objectif de cette thèse est de proposer une solution MAC dynamique pour les réseaux dédiés à l’Internet des Objets. La solution proposée a la capacité de s'adapter aux conditions du réseau. Cette solution est basée sur un algorithme d'apprentissage automatique, qui apprend de l'historique du réseau afin d'établir la relation entre les conditions du réseau, les paramètres de la couche MAC et les performances du réseau en termes de fiabilité et de consommation d'énergie. La solution possède également l'originalité de faire coexister des nœuds utilisant de différentes configurations MAC au sein du même réseau. Les résultats de simulations ont montré qu'une solution MAC basée sur l'apprentissage automatique pourrait tirer profit des avantages des différents protocoles MAC classiques. Les résultats montrent aussi qu'une solution MAC cognitive offre toujours le meilleur compromis entre fiabilité et consommation d'énergie, tout en prenant en compte l'équité entre les nœuds du réseau. La solution MAC cognitive testée pour des réseaux à haute densité a prouvé des bonnes propriétés de passage à l’échelle par rapport aux protocoles MACs classiques, ce qui constitue un autre atout important de notre solution
Dedicated networks for the Internet of Things appeared with the promise of connecting thousands of nodes, or even more, to a single base station in a star topology. This new logic represents a fundamental change in the way of thinking about networks, after decades during which research work mainly focused on multi-hop networks. Internet of Things networks are characterized by long transmission range, wide geographic coverage, low energy consumption and low set-up costs. This made it necessary to adapt the protocols at different architectural layers in order to meet the needs of these networks. Several players compete in the Internet of Things market, each trying to establish the most efficient solution. These players are mostly focused on modifying the physical layer, on the hardware part or through proposing new modulations. However, with regard to the channel access control solution (known as the MAC protocol), all the solutions proposed by these players are based on classic approaches such as Aloha and CSMA. The objective of this thesis is to propose a dynamic MAC solution for networks dedicated to the Internet of Things. The proposed solution has the ability to adapt to network conditions. This solution is based on a machine learning algorithm that learns from network history in order to establish the relationship between network conditions, MAC layer parameters and network performance in terms of reliability and energy consumption. The solution also has the originality of making possible the coexistence of nodes using different MAC configurations within the same network. The results of simulations have shown that a MAC solution based on machine learning could take advantage of the good properties of different conventional MAC protocols. The results also show that a cognitive MAC solution always offers the best compromise between reliability and energy consumption, while taking into account the fairness between the nodes of the network. The cognitive MAC solution tested for high density networks has proven better scalability compared to conventional MAC protocols, which is another important advantage of our solution
APA, Harvard, Vancouver, ISO, and other styles
7

Michopoulos, Vasilis. "Congestion and medium access control in 6LoWPAN WSN." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/11463.

Full text
Abstract:
In computer networks, congestion is a condition in which one or more egressinterfaces are offered more packets than are forwarded at any given instant [1]. In wireless sensor networks, congestion can cause a number of problems including packet loss, lower throughput and poor energy efficiency. These problems can potentially result in a reduced deployment lifetime and underperforming applications. Moreover, idle radio listening is a major source of energy consumption therefore low-power wireless devices must keep their radio transceivers off to maximise their battery lifetime. In order to minimise energy consumption and thus maximise the lifetime of wireless sensor networks, the research community has made significant efforts towards power saving medium access control protocols with Radio Duty Cycling. However, careful study of previous work reveals that radio duty cycle schemes are often neglected during the design and evaluation of congestion control algorithms. This thesis argues that the presence (or lack) of radio duty cycle can drastically influence the performance of congestion control mechanisms. To investigate if previous findings regarding congestion control are still applicable in IPv6 over low power wireless personal area and duty cycling networks; some of the most commonly used congestion detection algorithms are evaluated through simulations. The research aims to develop duty cycle aware congestion control schemes for IPv6 over low power wireless personal area networks. The proposed schemes must be able to maximise the networks goodput, while minimising packet loss, energy consumption and packet delay. Two congestion control schemes, namely DCCC6 (Duty Cycle-Aware Congestion Control for 6LoWPAN Networks) and CADC (Congestion Aware Duty Cycle MAC) are proposed to realise this claim. DCCC6 performs congestion detection based on a dynamic buffer. When congestion occurs, parent nodes will inform the nodes contributing to congestion and rates will be readjusted based on a new rate adaptation scheme aiming for local fairness. The child notification procedure is decided by DCCC6 and will be different when the network is duty cycling. When the network is duty cycling the child notification will be made through unicast frames. On the contrary broadcast frames will be used for congestion notification when the network is not duty cycling. Simulation and test-bed experiments have shown that DCCC6 achieved higher goodput and lower packet loss than previous works. Moreover, simulations show that DCCC6 maintained low energy consumption, with average delay times while it achieved a high degree of fairness. CADC, uses a new mechanism for duty cycle adaptation that reacts quickly to changing traffic loads and patterns. CADC is the first dynamic duty cycle pro- tocol implemented in Contiki Operating system (OS) as well as one of the first schemes designed based on the arbitrary traffic characteristics of IPv6 wireless sensor networks. Furthermore, CADC is designed as a stand alone medium access control scheme and thus it can easily be transfered to any wireless sensor network architecture. Additionally, CADC does not require any time synchronisation algorithms to operate at the nodes and does not use any additional packets for the exchange of information between the nodes (For example no overhead). In this research, 10000 simulation experiments and 700 test-bed experiments have been conducted for the evaluation of CADC. These experiments demonstrate that CADC can successfully adapt its cycle based on traffic patterns in every traffic scenario. Moreover, CADC consistently achieved the lowest energy consumption, very low packet delay times and packet loss, while its goodput performance was better than other dynamic duty cycle protocols and similar to the highest goodput observed among static duty cycle configurations.
APA, Harvard, Vancouver, ISO, and other styles
8

Mitchell, Paul Daniel. "Effective medium access control for geostationary satellite systems." Thesis, University of York, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Karmacharya, Himal P. (Himal Prasad) 1977. "Distributed dynamic priority queuing medium access control portocol." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86683.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.
Includes bibliographical references (p. 113-116).
by Himal P. Karmacharya.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
10

Feng, Jiao. "Distributed relay selection aided cooperative medium access control." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/362096/.

Full text
Abstract:
A variety of cooperative medium access control (MAC) schemes are designed for the sake of improving the achievable transmit rate and for reducing the transmit energy dissipation of cooperative communication systems relying on realistic greedy - rather than altruistic - relay nodes (RNs). Based on the system’s objective functions (OF), novel distributed relay selection schemes are developed for selecting the best relay node (RN) set. In order to investigate the effect of the proposed MAC schemes on the performance of the cooperative communication systems considered, the system’s stability is analysed with the aid of queueing theory. Specifically, we first consider a cooperative spectrum leasing system (CSLS) supporting a licensed source node (SN) and a licensed destination node (DN) as well as multiple unlicensed greedy RNs, which require rewards for providing cooperative transmission assistance. A ’win-win’ (WW) cooperative framework (WWCF) is formulated for sake of improving the achievable transmit rate and for simulanteously minimizing the energy dissipation of the co- operative spectrum leasing system considered. Based on the proposed WWCF, the licensed SN intends to lease part of its spectrum to the unlicensed RNs in exchange for cooperative support, leading to an improved transmit rate, while simultaneously reducing the transmit power. The unlicensed RNs also have an incentive to provide cooperative transmission assistance for the SN, since in exchange for relaying assistance they are allowed to access the licensed spectrum for transmitting their own data, and even to maintain their own target Quality of Service (QoS). Furthermore, a distributed WW cooperative MAC protocol is developed for implementing the proposed WWCF by designing a specific signalling procedure and the format of both the data frame control messages as well as a distributed relay selection scheme. More explicitly, a novel backoff algorithm is designed for distributively selecting the best RN in order to optimize the system’s OF formulated by our WWCF. Our simulation results demonstrated that both substantial rate improvements and considerable energy savings are achieved by implementing the proposed distributed WW cooperative MAC protocol. However, encountering a low service rate at the MAC layer may excessively increase the length of queue in the buffer storing the incoming packet. Hence, the queueing system may become unstable due to the low service rate limited by an inferior MAC protocol design. Hence we conceived a queueing model for our cooperative spectrum leasing system relying on the proposed distributed WW cooperative MAC protocol. In order to simplify the stability analysis, some idealized simplifying assumptions are invoked and a non-Markovian analysis method is used for investigating the transmission probability of each node and for deriving the average departure rates at both the SN and the RNs operating under the control of the proposed distributed WW cooperative MAC protocol. Our simulation results confirmed that an increased stable throughput is provided by the proposed distributed WW cooperative MAC protocol for both the SN and RNs compared to the benchmark schemes. As an improved extension of the proposed WWCF, a WW reciprocal-selection-based framework (WWRSF) is formulated for a cooperative spectrum leasing system hosting multiple licensed transmission pairs and multiple unlicensed transmission pairs. The SN of a licensed pair of nodes is referred as the primary transmitter (PT), while the SN of an unlicensed transmission pair is termed as the secondary transmitter (ST). Based on the proposed WWRSF, the PT intends to lease its spectral resources to an appropriate secondary transmitter (ST) in exchange for cooperative transmission assistance for the sake of minimizing its transmit power and simultaneously satisfying its transmit rate requirement. The ST has an incentive to collaborate with the best PT for the sake of minimizing the ST’s transmit power under the constraint of its QoS requirement, whilst simultaneously winning a transmission opportunity for its own traffic. Based on the OFs of the proposed WWRSF, a distributed WW reciprocal-selection-based medium access scheme (DWWRS-MAS) is designed, which is capable of producing the best cooperative pairs set for the sake of reducing the transmit power of both the PT and of the ST in each cooperative pair, whilst simultaneously satisfying their transmit rate requirements. This is achieved with the aid of the proposed distributed reciprocal selection between the active PTs and STs, which have the capability of providing successful cooperative transmission assistance. Moreover, we analyse both the queueing stability and the algorithmic stability of our cooperative spectrum leasing system exploiting our DWWRS-MAS. In comparison to the benchmark schemes considered in the literature, the proposed DWWRS-MAS is capable of achieving a performance, which is comparable to that of the optimal schemes in terms of the system’s transmit power and system’s achievable transmit rate.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Medium access control"

1

1973-, Wu Hongyi, and Pan Yi 1960-, eds. Medium access control in wireless networks. New York: Nova Science Publishers, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Ping, and Weihua Zhuang. Distributed Medium Access Control in Wireless Networks. New York, NY: Springer New York, 2013. http://dx.doi.org/10.1007/978-1-4614-6602-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Ping. Distributed Medium Access Control in Wireless Networks. New York, NY: Springer New York, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Elli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Elli, Kartsakli, ed. Contention-based collision-resolution medium access control algorithms. New York: Nova Science Publishers, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Guterman, Jose. A medium access control protocol for voice transmission on an integrated voice/data LAN. Ottawa: National Library of Canada, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

IEEE Computer Society. Technical Committee on Computer Communications., Institute of Electrical and Electronics Engineers., and IEEE Standards Board, eds. IEEE standards for local and metropolitan area networks: Integrated Services (IS) LAN interface at the Medium Access Control (MAC) and Physical (PHY) Layers. New York, N.Y., USA: Institute of Electrical and Electronics Engineers, 1994.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

IEEE Computer Society. LAN/MAN Standards Committee.., ed. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- specific requirements -- part 11, wireless LAN medium access control (MAC) and physical layer (PHY) specifications. New York, N.Y: Institute of Electrical and Electronics Engineers, 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

IEEE Computer Society. LAN/MAN Standards Committee. and Institute of Electrical and Electronics Engineers., eds. Information technology -- telecommunications and information exchange between systems -- local and metropolitan area networks -- specific requirements: Part 11 : wireless LAN medium access control (MAC) and physical layer (PHY) specifications. New York, NY: Institute of Electrical and Electronics Engineers, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

IEEE Computer Society. LAN/MAN Standards Committee., Institute of Electrical and Electronics Engineers., and IEEE Standards Board, eds. IEEE standards for local and metropolitan area networks: Supplement to Integrated Services (IS) LAN interface at the Medium Access Control (MAC) and Physical (PHY) Layers : specification of ISLAN16-T. New York, N.Y., USA: Institute of Electrical and Electronics Engineers, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Medium access control"

1

Holt, Alan, and Chi-Yu Huang. "Medium Access Control." In Computer Communications and Networks, 35–50. London: Springer London, 2010. http://dx.doi.org/10.1007/978-1-84996-275-9_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hercog, Drago. "Medium Access Control." In Communication Protocols, 257–84. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-50405-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Allen, Joby. "Medium Access Control." In WCDMA - Requirements and Practical Design, 221–38. Chichester, UK: John Wiley & Sons, Ltd, 2004. http://dx.doi.org/10.1002/0470861797.ch6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Celentano, Ulrico, and Ian Oppermann. "Medium Access Control." In UWB Theory and Applications, 157–73. Chichester, UK: John Wiley & Sons, Ltd, 2005. http://dx.doi.org/10.1002/0470869194.ch7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Weik, Martin H. "medium access control." In Computer Science and Communications Dictionary, 996. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/1-4020-0613-6_11282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pahlavan, Kaveh. "Medium Access Control." In Understanding Communications Networks – for Emerging Cybernetics Applications, 247–306. New York: River Publishers, 2022. http://dx.doi.org/10.1201/9781003339915-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Otnes, Roald, Alfred Asterjadhi, Paolo Casari, Michael Goetz, Thor Husøy, Ivor Nissen, Knut Rimstad, Paul van Walree, and Michele Zorzi. "Medium Access Control." In Underwater Acoustic Networking Techniques, 19–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-25224-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Singh, Harkirat. "Medium Access Control Design." In 60 GHz Technology for Gbps WLAN and WPAN, 239–65. Chichester, UK: John Wiley & Sons, Ltd, 2010. http://dx.doi.org/10.1002/9780470972946.ch9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Jiang, Shengming. "Medium Access Control (MAC)." In Wireless Networking Principles: From Terrestrial to Underwater Acoustic, 51–74. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7775-3_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Trsek, Henning. "Deterministic Medium Access Control." In Isochronous Wireless Network for Real-time Communication in Industrial Automation, 69–90. Berlin, Heidelberg: Springer Berlin Heidelberg, 2016. http://dx.doi.org/10.1007/978-3-662-49158-4_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Medium access control"

1

Cui, Tao, and Tracey Ho. "On multiple access random medium access control." In 2009 IEEE International Symposium on Information Theory - ISIT. IEEE, 2009. http://dx.doi.org/10.1109/isit.2009.5205457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Boulila, Narjes, and Leila Azouz Saidane. "Medium access control in VANET." In 2017 Sixth International Conference on Communications and Networking (ComNet). IEEE, 2017. http://dx.doi.org/10.1109/comnet.2017.8285596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Deligiannis, Nikos, João F. C. Mota, George Smart, and Yiannis Andreopoulos. "Decentralized multichannel medium access control." In the 14th International Conference. New York, New York, USA: ACM Press, 2015. http://dx.doi.org/10.1145/2737095.2737108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Seyedin, E., D. C. Lee, S. Yang, E. Lee, D. Boone, and M. Steiner-Jovic. "Powermesh medium access control protocol." In 2011 5th International Conference on Signal Processing and Communication Systems (ICSPCS 2011). IEEE, 2011. http://dx.doi.org/10.1109/icspcs.2011.6140850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Medium Access Control and Networks." In 2006 IEEE International Symposium on Power Line Communications and Its Applications. IEEE, 2006. http://dx.doi.org/10.1109/isplc.2006.247416.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bodas, Shreeshankar, Devavrat Shah, and Damon Wischik. "Congestion control meets medium access." In the 12th ACM SIGMETRICS/PERFORMANCE joint international conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2254756.2254812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Petrioli, C. "Session details: Medium access control." In MobiCom04: Tenth Annual International Conference on Mobile Computing and Networking. New York, NY, USA: ACM, 2004. http://dx.doi.org/10.1145/3249351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nandagopal, Thyaga. "Session details: Medium access control." In MobiCom/MobiHoc '07: The Thirteenth Annual International Conference on Mobile Computing and Networking and The 8th ACM International Symposium on Mobile Ad Hoc Networking and Computing. New York, NY, USA: ACM, 2007. http://dx.doi.org/10.1145/3259093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

"Session A5: Medium Access Control." In 2007 IEEE International Symposium on Power Line Communications and Its Applications. IEEE, 2007. http://dx.doi.org/10.1109/isplc.2007.371068.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Illiano, Jessica, Michele Viscardi, Seid Koudia, Marcello Caleffi, and Angela Sara Cacciapuoti. "Quantum Internet: from Medium Access Control to Entanglement Access Control." In 2022 IEEE Globecom Workshops (GC Wkshps). IEEE, 2022. http://dx.doi.org/10.1109/gcwkshps56602.2022.10008516.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Medium access control"

1

Ramanathan, Ram. Medium Access Control for XG Communications. Fort Belvoir, VA: Defense Technical Information Center, June 2004. http://dx.doi.org/10.21236/ada425223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Liu, Zuqiu, and William E. Burr. A conformance test for FDDI Medium Access Control (MAC). Gaithersburg, MD: National Institute of Standards and Technology, 1990. http://dx.doi.org/10.6028/nist.ir.90-4267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shao, C., H. Deng, R. Pazhyannur, F. Bari, R. Zhang, and S. Matsushima. IEEE 802.11 Medium Access Control (MAC) Profile for Control and Provisioning of Wireless Access Points (CAPWAP). RFC Editor, April 2015. http://dx.doi.org/10.17487/rfc7494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Bushby, Steven T. A formal analysis of the BACnet MSTP medium access control protocol. Gaithersburg, MD: National Institute of Standards and Technology, 1992. http://dx.doi.org/10.6028/nist.ir.4777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sinnema, R., and E. Wilde. eXtensible Access Control Markup Language (XACML) XML Media Type. RFC Editor, November 2013. http://dx.doi.org/10.17487/rfc7061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Sivabalan, S., S. Boutros, H. Shah, S. Aldrin, and M. Venkatesan. Media Access Control (MAC) Address Withdrawal over Static Pseudowire. RFC Editor, February 2016. http://dx.doi.org/10.17487/rfc7769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Klinger, Bailey, Asim Khwaja, and Joseph LaMonte. Improving Credit Risk Analysis with Psychometrics in Peru. Inter-American Development Bank, October 2013. http://dx.doi.org/10.18235/0009139.

Full text
Abstract:
Access to finance remains a challenge for some micro, small, and medium-sized enterprises (MSMEs) in Peru, particularly informal enterprises with no borrowing history in the formal financial system. Lenders lack the tools to reach these borrowers with sufficient scale and control over risk due in part to the shortcomings of current screening technologies. For this paper, the authors carried out a pilot test of an innovative psychometric tool aimed at evaluating credit risk for business owners seeking a loan from Financiera Confianza, the fourth largest Empresa Financiera in Peru. Applicant responses were compared to self-reported sales, subsequent loan repayment performance, and credit bureau data to determine if psychometric-based credit scoring models could reduce the constraints on MSME finance. The authors created a scorecard based on that information using data from other countries and evaluated its effectiveness on this sample. It achieved a Gini coefficient of between 20 and 40 percent. Those MSMEs rejected by a psychometrically enhanced application scorecard with this Gini coefficient have a probability of defaulting that is up to four times greater than those accepted by the scorecard. Along with other policies to reduce information asymmetry in MSME lending, such a tool could help relieve constraints on MSME finance in Peru.
APA, Harvard, Vancouver, ISO, and other styles
8

Okamoto, O., M. Maruyama, and T. Sajima. Forwarding Media Access Control (MAC) Frames over Multiple Access Protocol over Synchronous Optical Network/Synchronous Digital Hierarchy (MAPOS). RFC Editor, November 2002. http://dx.doi.org/10.17487/rfc3422.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Diwakar, Vidya, Emmanuel Tumusiime, Marta Eichsteller, Joseph Simbaya, and Beryl Oranga. Empowered Worldviews: Assessing the Persistence of Psychosocial Intervention Effects in Zambia. Institute of Development Studies, February 2024. http://dx.doi.org/10.19088/cpan.2023.024.

Full text
Abstract:
Evidence on the persistence of psychosocial outcomes of interventions over the medium and long term, and in the face of shocks and stressors, is limited. We examined the extent to which empowerment associated with a psychosocial, faith-based approach, Empowered Worldview (EWV) persisted 3–5 years post-delivery of the intervention in Zambia among smallholder farmers. The EWV intervention in Zambia was delivered as part of THRIVE, an integrated livelihoods programme. We followed a previous study to disaggregate individual-level empowerment associated with EWV into three domains: internal (which relates to ‘power within’), localised (typically participation and access), and structural (e.g. institutional, environmental, and social structures). To explore the persistence of EWV effects on empowerment, we used mixed methods and longitudinal data collected in 2020 and 2023, which were the midline and endline points of the THRIVE programme. Empirically, we used descriptive and regression analysis to compare internal and localised empowerment levels between the survey rounds (2020 and 2023) across study groups – including groups that received EWV before and after 2020 – and to the control group. We also re- interviewed a subset of EWV participants interviewed in 2020 to understand how empowerment has changed at the individual level over time . The results show levels of internal empowerment associated with the EWV intervention persisted between the midline and endline surveys, especially when combined with THRIVE livelihood interventions. At the midline, 80.0 per cent of THRIVE with EWV participants were empowered, compared to 82.3 per cent at the endline. In contrast, 72.6 per cent and 73.07 per cent of the control sample participants were empowered at the midline and the endline, respectively. Quantitative results further show that localised empowerment significantly improved between survey rounds among participants who received EWV training and is positively associated with internal empowerment, consistent with literature that suggests localised enablers (supporting social environments) are crucial to sustaining internal empowerment. The qualitative data shows that persistent internal and localised empowerment was observed mostly among households in the non- poor wellbeing category, suggesting that additional interventions are needed to reach the poorest participants. Results also show internal and localised empowerment are positively associated with indicators of household resilience. We conclude the paper with recommendations for programming.
APA, Harvard, Vancouver, ISO, and other styles
10

Bueso-Merriam, Jacqueline, Francisco Demichelis, María Carmen Fernández Díez, David Giuliodori, Alejandro Rodríguez, and Rodolfo Stucchi. The Impact of the Lending Program for the Productive Development and Employment Generation of the San Juan Province. Inter-American Development Bank, November 2016. http://dx.doi.org/10.18235/0007975.

Full text
Abstract:
A shortcoming of the current empirical impact evaluation literature is the lack of studies that measure the effect of access to credit in the medium and long term, as well as the impact on interventions targeted at micro-, small-, and medium-sized enterprises (MSMEs). This study addresses both aspects by analyzing the average impact that the Lending Program for the Productive Development and Employment Generation of the San Juan Province has had on sales, employment, investment, and productivity of beneficiary MSMEs. The authors measured the abovementioned impacts using a lagged dependent variable (LDV) model that, beyond controlling for selection bias, also controls for the sequential entry of companies into the program. To conduct this analysis, the authors used a survey implemented by the National University of San Juan to 664 companies. The results of the study indicate a positive and statistically significant impact of 6.9 percent on the likelihood to invest, 9.7 percent on sales, 4.3 percent on employment, and 6.4 percent on labor productivity. The analysis allows for the identification of differentiated impacts by type of company, as classified by size and sector or type of economic activity.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography