Medium Access Control


Also found in: Acronyms.

Medium Access Control

References in periodicals archive ?
Kwak, "An Ultra Low-power and Traffic-adaptive Medium Access Control Protocol for Wireless Body Area Network," Medical System, vol.
Medium access control of wireless LANs for mobile computing.
The medium access control scheme is implemented in a time-slotted fashion on the common control channel.
Modeling and designing an efficient Medium Access Control (MAC) protocol is a challenging factor in WBANs as the energy consumption of the sensor node has to be very less and the real time data and the emergency data have to be continuously transmitted and prioritized respectively.
[3] "IEEE standard for information technology-telecomunications and information exchange between systems-local and metropolitan area networks-specific requirements--part 11: Wireless LAN medium access control (mac) and physical layer (phy) specifications amendment 5: Enhancements for higher thoughput", IEEE Std 802.11n (Amendment to IEEE Std 802.11 -2007 as amended by IEEE Std 802.11k-2008, IEEE Std 802.11r-2008, IEEE Std 802.11y-2008, and IEEE Std 802.11w-2009, pp.
Qasim, "Adaptive medium access control protocol for wireless body area networks," International Journal of Distributed Sensor Networks, vol.
[11] Chu et al., "Application of reinforcement learning to medium access control for wireless sensor networks".
(2005) Medium Access Control in Wireless Sensor Networks.
The Medium Access Control (MAC) entity MAC-d Protocol Data Units (PDUs) are buffered at Node B.
By combining the interference classification algorithm and chosen mitigation strategies, Interference Aware Self-Adapting Medium Access Control is developed.
Medium access control (MAC) protocols play a critical role in extending network lifetime by controlling the dominant sources of energy waste such as packet collisions, overhearing, idle listening, and control packet overhead.
Fuzzy logic was applied to cognitive radio network for controlling the transmission power in order to reduce harmful interference to licensed user [15] and for cross layer optimization between medium access control layer and transport layer [16].