Essays about: "MEDIUM ACCESS CONTROL LAYER"

Showing result 1 - 5 of 20 essays containing the words MEDIUM ACCESS CONTROL LAYER.

  1. 1. Energy Sustainable Reinforcement Learning-based Adaptive Duty-Cycling in Wireless Sensor Networks-based Internet of Things Networks

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Nadia Charef; [2023]
    Keywords : Reinforcement Learning; Q-learning; Dynamic Energy Management; Energy Sustainabiltiy; IEEE802.15.4 MAC Protocol; Adaptive Duty Cycling; Wireless Sensors Networks; Internet of Things;

    Abstract : The Internet of Things (IoT) is widely adopted across various fields due to its flexibility and low cost. Energy-harvesting Wireless Sensor Networks (WSNs) are becoming a building block of many IoT applications and provide a perpetual source of energy to power energy-constrained IoT devices. READ MORE

  2. 2. Energy Efficient Communication Scheduling for IoT-based Waterbirds Monitoring: Decentralized Strategies

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Otabek Sobirov; [2022]
    Keywords : TSCH; 6TiSCH; RPL; scheduling; energy consumption; COOJA; autonomous scheduling; distributed scheduling; reinforcement learning; RL-based scheduling; Q-Learning;

    Abstract : Monitoring waterbirds have several benefits, including analyzing the number of endangered species, giving a reliable indication of public health, etc. Monitoring waterbirds in their habitat is a challenging task since the location is distant, and the collection of monitoring data requires large bandwidth. READ MORE

  3. 3. Fuzz testing on eNodeB over the air interface : Using fuzz testing as a means of testing security

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Anna Pestrea; [2021]
    Keywords : Fuzzer; fuzz-testing; eNB; LTE; air interface; MAC layer; MAC protocol;

    Abstract : In modern society, security has become an increasingly important subject, as technologyhas become an integrated part of everyday life. The security of a system can be tested withthe help of fuzzing, where incoming messages to the system are altered. READ MORE

  4. 4. Performance Evaluation of MAC protocols in Wireless Sensor Networks

    University essay from Mälardalens högskola/Akademin för innovation, design och teknik

    Author : Mattias Orell; [2016]
    Keywords : ;

    Abstract : Wireless Sensor Networks have limited resources in terms of processing capability, battery power, and channel bandwidth, which makes them both lightweight and cheap. These limitations and also advantages come with some problems regarding network lifetime and fault tolerance, as the nodes share the same wireless media with WiFi, Bluetooth and microwaves. READ MORE

  5. 5. Fundamental performance analysis ofmillimeter wave relay networks

    University essay from KTH/Reglerteknik

    Author : Roberto Congiu; [2015]
    Keywords : ;

    Abstract : unicationtechnologies, the millimeter wave (mmWave) bands are consideredas a promising candidate to extremely high data rate access in futurewireless networks. MmWave communications exhibit high attenuations,vulnerability to obstacles, and sparse-scattering environments. READ MORE