𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Performance evaluation of two multiple-access protocols

✍ Scribed by P Mui; ND Georganas


Publisher
Elsevier Science
Year
1984
Tongue
English
Weight
467 KB
Volume
7
Category
Article
ISSN
0140-3664

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Performance evaluation of distributed mu
✍ Jong-Hyouk Lee; Tai-Myoung Chung πŸ“‚ Article πŸ“… 2007 πŸ› John Wiley and Sons 🌐 English βš– 248 KB

## Abstract Mobile IPv6 (MIPv6) is a protocol that supports mobility of mobile nodes (MNs) within the IPv6 environment. However, the current MIPv6 supports insufficient mobility of MNs. If an MN is moved away from the home link, it takes time for the MN to make a registration and binding update at

Performance evaluation of packet reserva
✍ Tsugunao Kobayashi; Iwao Sasase πŸ“‚ Article πŸ“… 2000 πŸ› John Wiley and Sons 🌐 English βš– 302 KB

For local wireless communications, the packet reservation multiple access (PRMA) protocol, which combines random access with time division access, is known as an efficient access method to use silence periods of voice traffic. However, the performance of PRMA at the base station is degraded under he

Performance evaluation of a new MAC prot
✍ Christophe S. Jelger; Jaafar M. H. Elmirghani πŸ“‚ Article πŸ“… 2002 πŸ› John Wiley and Sons 🌐 English βš– 154 KB πŸ‘ 1 views

## Abstract This article considers a WDM slotted‐ring network architecture. A slotted MAC protocol was designed to be used in a metropolitan environment. The results of a discrete event simulation are presented. Assuming that a maximum load threshold is not exceeded, fairness between access nodes i

Vulnerability of two multiple-key agreem
✍ Mohammad Sabzinejad Farash; Majid Bayat; Mahmoud Ahmadian Attari πŸ“‚ Article πŸ“… 2011 πŸ› Elsevier Science 🌐 English βš– 195 KB

In 2008, Lee et al. proposed two multiple-key agreement protocols, first one based on elliptic curve cryptography (ECC) and the other one, based on bilinear pairings. Shortly after publication, Vo et al. showed that the Lee-Wu-Wang's pairing-based protocol is vulnerable to impersonation attack then