Essays about: "MAC protocol"

Showing result 21 - 25 of 66 essays containing the words MAC protocol.

  1. 21. Standard APCO25 Physical Layer of the Radio Transmission Chain

    University essay from KTH/Kommunikationsteori

    Author : Mathieu Simon; [2014]
    Keywords : ;

    Abstract : Professional Mobile Radio (PMR) also known as Private Mobile Radio or Land Mobile Radio (LMR) are radio systems conceived for public safety or professional event organizers. They are designed to provide a reliable and robust communication system independent from conventional public networks. READ MORE

  2. 22. Study of TCP Available Bandwidth Using NS2 and Its Forecasting Based on Genetic Algorithm

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap

    Author : Francisco Domingo Sanchez Vizcaino; Cristian Hernandez Benet; [2014]
    Keywords : ;

    Abstract : On the one hand, the available bandwidth in a bandwidth-limited medium as the wireless medium is a highly demanded topic of study. On the other hand, the Transport Control Protocol (TCP) is one of the most used transport protocols on the Internet. READ MORE

  3. 23. Comparison of link layer of BLE and 802.15.4 : Running on Contiki OS

    University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Author : Prithviraj Narendra; [2014]
    Keywords : ;

    Abstract : There has been extensive research in the low power Wireless Sensor Network (WSN) community with 802.15.4 based platforms. A major factor for this is the support for 802. READ MORE

  4. 24. Multichannel Communication in Contiki's Low-power IPv6 Stack

    University essay from Institutionen för informationsteknologi

    Author : Beshr Al Nahas; [2013]
    Keywords : ;

    Abstract : Vast majority of wireless appliances used in household, industry and medical field share the ISM frequency band. These devices need to coexist and thus are challenged to tolerate their mutual interference. One way of dealing with this is by using frequency hopping; where the device changes its radio channel periodically. READ MORE

  5. 25. IPv6 Monitoring and Flow Detection

    University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikation

    Author : Theodros Ayichiluhm; Vivek Mohan; [2013]
    Keywords : IPv6; Monitoring; Windows; Linux;

    Abstract : IPv6 Privacy extensions, implemented in major operating systems, hide user’s identity by using a temporary and a randomly generated IPv6 addresses rather than using the former, EUI-64 format where the MAC address is part of the IPv6 address. This solution for privacy has created a problem for network administrators to back-trace an IPv6 address to a specific MAC address, since the temporary IP address used once by the node is removed from the interface after a period of time. READ MORE