2001
DOI: 10.1109/45.969594
|View full text |Cite
|
Sign up to set email alerts
|

The medium access control sublayer

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
9
0

Year Published

2010
2010
2014
2014

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 0 publications
0
9
0
Order By: Relevance
“…This hierarchical structure is modeled in such a manner that each layer isolates the layer above it from the rest of the protocol stack. The benefit of this is that, as technology advances the lower layers can be replaced, without affecting the upper layers as long as the interface between layers remains constant [15] [16]. The hierarchy uses encapsulation to provide the abstraction of protocol and services [15].…”
Section: Figure 1 Mobile Adhoc Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…This hierarchical structure is modeled in such a manner that each layer isolates the layer above it from the rest of the protocol stack. The benefit of this is that, as technology advances the lower layers can be replaced, without affecting the upper layers as long as the interface between layers remains constant [15] [16]. The hierarchy uses encapsulation to provide the abstraction of protocol and services [15].…”
Section: Figure 1 Mobile Adhoc Networkmentioning
confidence: 99%
“…It encodes the data being sent and make sure that data format is understandable by the recipient. Various higher level protocols like HTTP, FTP, TFTP, TELNET, and SNTP operate at this layer [15].…”
Section: Figure 1 Mobile Adhoc Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…The most common protocol stack found in wireless communications is composed of (lowest to highest) the physical layer, the data link layer, the network layer, the transport layer, and the application layer. The protocol stack of a WSN can be presented as [70]. The problems addressed in this layer are relevant but not the focus of the proposed research.…”
Section: Node Failure Challenge: Fault Tolerancementioning
confidence: 99%
“…below. This thesis will focus on the MAC layer, which is a subset of the DLL layer, and the NET layer [2][70].…”
mentioning
confidence: 99%