... “Reliable multicast in multi-access wireless LANs, ” Wireless Networks, vol 7, no 4, pp 359–369, 2001 [8] J Peng, “A new ARQ scheme for reliable broadcasting in wireless LANs, ” IEEE Communications Letters, ... performance analysis, the throughputs of the BMMM protocol and our proposed MAC protocol are derived Numerical examples show that our proposed MAC protocol increases the multicast MAC performance ... increases the multicast MAC performance for IEEE 802.11 wirelessLANs Reliable Multicast MAC Protocol S represents the set of STAs that are served by the PCF protocol U (⊂ S) represents the set of...
... proposals for unsynchronized protocols, and IEEE 802.15.4 [24], which is standardized technology for WSNs For comparison, an ideal MAC protocol is defined and modeled The following performance ... determined for the High Rate (HR) platform utilizing Nordic Semiconductor nRF2401A transceiver and for the Low Rate (LR) platform utilizing TI CC1000 transceiver The results for the HR platform are ... are designed The performance of the designed protocol is verified and compared to existing protocols and standards by performance modeling and energy analysis Finally, the performance and feasibility...
... load a secret information in the sensor nodes before their deployment in the network This secret information deployed in the network may be the secret key itself or an auxiliary information that ... global key For example in [6], the authors focus on developing cost-saving mechanisms while weakening the threat model They propose Key Infection, a lightweight security protocol suitable for use ... management solutions for WSNs additional memory space to store authentication keys In [12], the authors propose LEAP (Localized Encryption and Authentication Protocol) ; a key management protocol intended...
... fragment retransmission for very highspeed WLANs,” IEEE/ACM Transactions on Networking, vol 17, no 2, pp 591–604, 2009 [17] Y Xiao, “Packing mechanisms for the IEEE 802.11n wireless LANs, ” in Proceedings ... schemes [22, 23] are proposed by incorporating PHY layer information for the MAC protocol design The saturated goodput EURASIP Journal on Wireless Communications and Networking analysis of the IEEE ... with that by adopting fixed MPDU payload size, for example, m∗ = for FALA n scheme and m∗ = for fixed MPDU payload size under n SNR = 10 dB 4.2 Performance Comparison under Fixed Channel Conditions...
... 600 m wireless sensor network Similarly, it is observed the RAUR has much better performance In Table shows the energy usage for different protocols As can be seen, RAUR outperforms the other protocols ... compute a timeout value suitable for that particular situation For example, such timeout could be set according to the Maximum number of hops we allow for each RREQ to be forwarded Let us denote, timeout ... will need to be informed of the invalid route This information is transmitted in the RERR packets There are some more efficient route ways to improve the efficiency for route recovery for example, making...
... receivers forwireless sensor networks Ph.D Dissertation, EECS Department, University of California, Berkeley, May 2008 [7] W Ye, J Heidemann, D Estrin, An energy-efficient MAC protocolforwireless ... and sends a long continuous preamble for communication as shown in Figure 11 It performs CCA before communication The average power consumption for preamble for B-MAC is calculated using (2) (2) ... MAC protocolfor the medical body area network, in 1st International Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace Electronic Systems Technology, Wireless...
... access protocol with power backoff (CSMA/PB),” Ad Hoc Networks, vol 5, no 8, pp 1233–1250, 2007 [19] S Romaszko and C Blondia, “Bounds selection—dynamic reset protocolforwireless ad hoc LANs, ” ... investigated the performance of the SNAPdMac protocol against the IEEE 802.11 DCF standard and/or the basic power control protocol from [2] (see in the appendix a short description of the protocol) The ... adjusted values of SNAPdMac, the protocol outperforms the IEEE 802.11 DCF standard and basic power control protocol noticeably The SNAPdMac 08Coll35 achieves the best performance, which means that...
... demonstrate reliable performance for synthetic channels with stationary parameters, performance, and complexity, investigations for realistic channels have not been carried out for these methods Based ... throughput We assume the same P for all nodes Throughput performance of the aforementioned models for Channel MAC is presented in Figure The results are shown for a different numbers of node pairs ... fairness in respect to the wireless nodes and confirm the fairness of the Channel MAC protocolFor the IEEE 802.11 simulation, we have used the fading simulator extension [34] for NS2 to consider the...
... that K = for 802.15.4 residual channels [19] and K = 10 for 802.11 residual channels [21], and we perform all our analysis for a parameterized value of K so that the analysis is valid for Markov ... EURASIP Journal on Wireless Communications and Networking 3.5 Analytical Performance Evaluation At this point, we have developed models for Simple Positive-ACK, PLO, and SRVF For the performance evaluation ... Empirical Performance Comparison of Reliable Protocols We now use wireless traces collected over real networks to empirically evaluate protocols under study The first part of EURASIP Journal on Wireless...
... and control protocols, rate adjustment mechanisms, fairness schemes, and transport protocols forwireless sensor networks are reviewed In [8, 9], the major issues of transport layer protocols in ... we present a single MCCP protocol that mitigates congestion while providing general event information, per-node event information, and prioritized event information for multiple events Moreover, ... based forwarding Figure 15: Per-node throughput of MCCP in FERM using schedule-based and jitter-based forwarding CONCLUSION The paper presents a multievent congestion control protocol (MCCP) for wireless...
... submitted for publication [6] W B Heinzelman, A P Chandrakasan, and H Balakrishnan, “An application-specific protocol architecture forwireless microsensor networks,” IEEE Transactions on Wireless ... Nieberg, and P Havinga, “Collaborative communication protocols forwireless sensor networks,” in Proc European Research on Middleware and Architectures for Complex and Embedded Cooperative Systems Workshop, ... Department, University of California, Los Angeles, Calif, USA, 1999 [16] C E Perkins, E M Royer, S R Das, and M K Marina, “Performance comparison of two on-demand routing protocols for ad hoc networks,”...
... application-specific-integrated-circuits (ASICs) [27–29] In [25], a wireless sensor platform for noninvasive biomedical research is demonstrated The platform achieves a small form factor, but with a relatively large power ... rechargeable battery, the platform can operate for only 12 hours for continuous real time ECG monitoring at 500 Hz with Bluetooth In [26], a wireless multisensor system for real time monitoring of ... MAC protocol design and the application QoS are not addressed Therefore, in Chapter 3, a real-time scalable network controller IC with a light-weight TDMA MAC protocolfor multi-patient wireless...
... based MAC protocol [31] 23 2.3.5 Traffic-Adaptive MAC Protocol (TRAMA) 24 2.3.6 Data-gathering MAC protocol 25 2.4 SIFT – A low latency MAC protocolfor event-driven wireless ... event-driven wireless sensor networks - 17 - 2.3 Energy efficient MAC protocols forwireless sensor networks 2.3.1 Energy Conservation Principles Wireless nodes typically have limited energy for communications ... mind 2.4 SIFT – A low latency MAC protocolfor event-driven wireless sensor networks 2.4.1 SIFT design SIFT [33] is a MAC protocol proposed for event-driven wireless sensor network environments...
... Control Protocol TORA Temporally Ordered Routing Algorithm TTL Time To Live UC University of California WRP Wireless Routing Protocol ZRP Zone Routing Protocol xi A Robust Routing Protocolfor MANET ... 4.1 PDR Performance with Different RETs 98 Figure 4.2 Overhead Performance with Different RETs 98 Figure 4.3 PDR Performance with Different RETs 99 viii A Robust Routing Protocolfor MANET List ... chapter ends with some suggestions for future work A Robust Routing Protocolfor MANET Chapter Two: Review of Early Routing Protocols CHAPTER TWO REVIEW OF EARLY ROUTING PROTOCOLS This chapter reviews...
... to as information security 2.2 Information Security Security is a property of a well-designed system according FISMA [10] The term information security means protecting information and information ... considered The identity provided for that employee must be used for every purpose that warrants the use of ID Therefore, most of the existing IDM cannot be used for all situations The federated ... NIST, Information Technology Laboratory, Boulder, December 2009 [8] The European Network and Information Security Agency (ENISA), “Cloud Computing: Benefits, Risks and Recommendations for Information...
... another Protocol “gateways” among as many as fourteen different industrial protocols are in the works (See Figure 10) Protocol bridges are used to link to LANs that use the same or very similar protocols ... with today’s WLANs Perception: WLANs are too expensive Reality: Like other computerized systems, WLANs are dropping in price due to advances in technology and competitive forces Wireless systems ... incompatible protocol? WLANs provide the solution Grayhill is working on the development for a number of protocol gateways These will connect a main LAN with a remote LAN working on different protocols...
... end-users for fixed to mobile substitution, everywhere coverage etc, highlights the need for dedicated in-building solutions In-building solutions are required for providing good quality wireless ... are widely used for coverage of e.g road and train tunnels, but can also be used for other types of buildings or parts of buildings A repeater has a donor antenna that is used for communicating ... non-cellular standards like for example Wireless LAN and Bluetooth In-building solutions are increasingly deployed and introduced to mobile networks, as user demands for “everywhere coverage” are...
... qualitative aspects, for instance wishes for more information The questionnaire contains the following scales: (a) Information about the disease; (b) Information about medical tests; (c) Information about ... (d) Information on other services, and single items: (a) Written information; (b) Information on CDs or tape/ video; (c) Satisfaction with the amount of information; (d) Desire for more information; ... formal document that also includes recommendations for subsequent cancer surveillance, management of late effects, and strategies for health promotion Essential in such an SCP is detailed information...