300g de farina,
una mica de llevadura,
mitja tassa de saïm i oli,
un ou batut,
julivert,
tomàtiga,
prebe,
tomàtiga,
ceba.
S'unta sa llauna amb mantega.
Posar es saïm i s'oli damunt aigo calenta.
Posar aigo teba en es llevat.
Posar s'ou a da farina.
Posar es saïm.
Posar en una greixonera i pastar.
Posar damunt aigo calenta i tapar amb padaços i diaris.
Deixar tovar.
Estirar sa pasta damunt sa llauna i posar ses verdures.
Enfornar 20 minuts amb es forn ben calent.
Sunday, December 23, 2007
Wednesday, December 19, 2007
IMS signaling over current wireless networks
experiments using the open ims core
Dragos Vingarzan, Peter Weik
Interesting result on the performance(delay and packet loss) of differents radio access networks: WLAN, HDSPA, WCDMA, GPRS. Spoiler: WLANs outperform the rest of the wireless access networks.
Dragos Vingarzan, Peter Weik
Interesting result on the performance(delay and packet loss) of differents radio access networks: WLAN, HDSPA, WCDMA, GPRS. Spoiler: WLANs outperform the rest of the wireless access networks.
Friday, November 30, 2007
Applications and Challenges of the 802.11e EDCA Mechanism: An Experimental Study
Albert Banchs, Arturo Azcorra, Carlos García, and Rubén Cuevas
The articles describes experiments wiht 802.11e and outlines the key issues in wlan performance analysis. A serious candidate for our journal club.
The articles describes experiments wiht 802.11e and outlines the key issues in wlan performance analysis. A serious candidate for our journal club.
Wednesday, November 28, 2007
A Throughput and Delay Model for IEEE 802.11e EDCA Under Non Saturation
PABLO SERRANO, ALBERT BANCHS and ARTURO AZCORRA
Much more complete/flexible than our proposal, but it is also much more complex too. Their simulations and results agree astonishingly well. I wish I had an implementation/script to compare my results to theirs... maybe I will devote some time to further understand their proposal and program a solver.
Much more complete/flexible than our proposal, but it is also much more complex too. Their simulations and results agree astonishingly well. I wish I had an implementation/script to compare my results to theirs... maybe I will devote some time to further understand their proposal and program a solver.
Sunday, November 25, 2007
Wednesday, November 21, 2007
Throughput analysis and optimal configuration of 802.11e EDCA
a,* b
Albert Banchs , Luca Vollero
At a first glanze, it seemed to me that this paper was irrelevant for my research, since it considers only non-real time traffic. However, the initial description of EDCA provided a piece of information that I was missing until now, which is that the PLCP preamble includes a NAV value accounting for the transmission of the data plus the ack. That means that the rest of the stations will remain silent for that period of time... even if there is a collision and no ack is sent!!!
Summarizing, there are some formulae that might be wrong in my WONS paper. What should I do now?
Albert Banchs , Luca Vollero
At a first glanze, it seemed to me that this paper was irrelevant for my research, since it considers only non-real time traffic. However, the initial description of EDCA provided a piece of information that I was missing until now, which is that the PLCP preamble includes a NAV value accounting for the transmission of the data plus the ack. That means that the rest of the stations will remain silent for that period of time... even if there is a collision and no ack is sent!!!
Summarizing, there are some formulae that might be wrong in my WONS paper. What should I do now?
Tuesday, November 20, 2007
NIHO: Network Initiated Handovers for next generation ALL IP Networks
Telemaco Melia,Rui Aguiar,Albert Bacnhs, Piotr Pacyna
The paper describes a demo at Barcelona's Infocom in which the network is in charge of initiating handovers in order to better distribute the load among APs, and satisfy the QoS requirements of all nodes.
The paper describes a demo at Barcelona's Infocom in which the network is in charge of initiating handovers in order to better distribute the load among APs, and satisfy the QoS requirements of all nodes.
Pervasiveness in a Competitive Multi-Operator Environment: The Daidalos Project
Rui L. Aguiar, Amardeo Sarma, Dennis Bijwaard, Loris Marchetti, Piotr Pacyna, Ricardo Pascotto
Describes de Daidalus european project which describes a beyond-IMS scenario. In this scenario the services will be created by autonomous service providers and will be discoverable and aggregable. Billing will happen seamlessly. Wireless operators will increase their collaboration to extend availability. The user will appear the network and the services as more intelligent, context-aware and adapted to its profile.
Describes de Daidalus european project which describes a beyond-IMS scenario. In this scenario the services will be created by autonomous service providers and will be discoverable and aggregable. Billing will happen seamlessly. Wireless operators will increase their collaboration to extend availability. The user will appear the network and the services as more intelligent, context-aware and adapted to its profile.
Monday, November 5, 2007
A Fair MAC Protocol for IEEE 802.11-Based Ad Hoc Networks: Design and Implementation
Bensaou, B. Member, Z.F.
Senior Member;
It is an extension of a paper from the same authors back in 2000. It repeats the theoretical framework and proposes some "practical" implementation guidelines.
Senior Member;
It is an extension of a paper from the same authors back in 2000. It repeats the theoretical framework and proposes some "practical" implementation guidelines.
Monday, October 22, 2007
A Generic Framework for Modeling MAC Protocols in Wireless Broadband Access Networks
Xinhua Ling, Jon W. Mark, and Xuemin (Sherman) Shen, University of Waterloo
Yu Cheng, Illinois Institute of Technology
Disappointing. However, it remembered me the need to include an explanation of the renewal theory in my next article. And to include yet another assumption for the model: no hidden terminal effect.
Yu Cheng, Illinois Institute of Technology
Disappointing. However, it remembered me the need to include an explanation of the renewal theory in my next article. And to include yet another assumption for the model: no hidden terminal effect.
Tuesday, October 16, 2007
Admission Control in IEEE 802.11e Wireless LANs
Deyun Gao and Jianfei Cai, King Ngi Ngan
Lots of stuff. First, a comprehensive explanation of DCF,PCF, EDCA, HCCA... etc. Then, a classification of admission control in model-based and measurement-based and a revision of the proposed alternatives.
Lots of stuff. First, a comprehensive explanation of DCF,PCF, EDCA, HCCA... etc. Then, a classification of admission control in model-based and measurement-based and a revision of the proposed alternatives.
more conferences
Copy&Paste from
http://netlab.cs.ucla.edu/cgi-bin/usemod10/wiki.cgi?MyDeadlines
* INFOCOM'08: Passed, Notification: 11/12 [CFP]
* PerCom?'08: 9/4, Notification: 11/16 [CFP]
* WiSec?'08, 9/15, Notification: 12/10/07 [CFP]
* NSDI'08: 10/9, Notification: 12/21 [CFP]
* SIGMETRICS'08, 10/26R, 11/2S, Notification: 2/5/08 [CFP]
* IPSN'08, 10/26R, 11/2S, Notification: 2/5/08 [CFP]
* IPTPS'09, 11/2, Notification: 1/11/08 [CFP]
* ICDCS'08: 11/15, Notification: 3/3/08 [CFP]
* Mobihoc'08: 11/22, Notification: 2/28 [CFP]
* MobiSys'08: 11/26R/12/4S, Notification: 3/4 [CFP]
* Secon;08: 12/4R, 12/11S, Notification: 3/14 [CFP]
* SIGCOMM'08: 1/31 (2007)
* MOBICOM'08: 3/2 (2007)
http://netlab.cs.ucla.edu/cgi-bin/usemod10/wiki.cgi?MyDeadlines
* INFOCOM'08: Passed, Notification: 11/12 [CFP]
* PerCom?'08: 9/4, Notification: 11/16 [CFP]
* WiSec?'08, 9/15, Notification: 12/10/07 [CFP]
* NSDI'08: 10/9, Notification: 12/21 [CFP]
* SIGMETRICS'08, 10/26R, 11/2S, Notification: 2/5/08 [CFP]
* IPSN'08, 10/26R, 11/2S, Notification: 2/5/08 [CFP]
* IPTPS'09, 11/2, Notification: 1/11/08 [CFP]
* ICDCS'08: 11/15, Notification: 3/3/08 [CFP]
* Mobihoc'08: 11/22, Notification: 2/28 [CFP]
* MobiSys'08: 11/26R/12/4S, Notification: 3/4 [CFP]
* Secon;08: 12/4R, 12/11S, Notification: 3/14 [CFP]
* SIGCOMM'08: 1/31 (2007)
* MOBICOM'08: 3/2 (2007)
Thursday, October 4, 2007
Analysis of Concatenation and Packing Mechanisms in IEEE 802.11n
Dionysios Skordoulis, Qiang Ni, Usman Ali & Marios Hadjinicolaou
It explains that there are two kinds of aggregation and that they can be combined. These aggregation is required to provide higher bitrates at the MAC SAP.
It explains that there are two kinds of aggregation and that they can be combined. These aggregation is required to provide higher bitrates at the MAC SAP.
Wednesday, October 3, 2007
Toward Efficient Service-Level QoS Provisioning in Large-Scale 802.11-Based Networks
Tarik Taleb, Tohoku University
Abdelhamid Nafaa and Liam Murphy, University College Dublin
Kazuo Hashimoto, Nei Kato, and Yoshiaki Nemoto, Tohoku University
The title/abstract/introduction seemed interesting. There was CAC (in which Cristina has been working), QoS (Boris), and Multirate (Anna). But I finished reading the article with the feeling that it doesn't offer anything new.
Abdelhamid Nafaa and Liam Murphy, University College Dublin
Kazuo Hashimoto, Nei Kato, and Yoshiaki Nemoto, Tohoku University
The title/abstract/introduction seemed interesting. There was CAC (in which Cristina has been working), QoS (Boris), and Multirate (Anna). But I finished reading the article with the feeling that it doesn't offer anything new.
Wednesday, September 19, 2007
Proportional fair throughput allocation in multirate IEEE 802.11e wireless LANs
Albert Banchs · Pablo Serrano · Huw Oliver
The paper deals with multirate unfairness in a saturated scenario. The author provide a mathematical analysis and obtain a utility function to maximize. Then, provide differents approaches to achieve fairnes: CWmin tuning and TXOP tuning. Each of this approaches can also be applied in a centralized or distributed fashion.
In my first reading I had the feeling that the approach based on TXOP was somehow flawed, but I have to double-check to confirm.
There are many interesting things in this article, and I think that, after reading it, I can rewrite my own article from a different perspective.
The paper deals with multirate unfairness in a saturated scenario. The author provide a mathematical analysis and obtain a utility function to maximize. Then, provide differents approaches to achieve fairnes: CWmin tuning and TXOP tuning. Each of this approaches can also be applied in a centralized or distributed fashion.
In my first reading I had the feeling that the approach based on TXOP was somehow flawed, but I have to double-check to confirm.
There are many interesting things in this article, and I think that, after reading it, I can rewrite my own article from a different perspective.
Monday, September 17, 2007
Licence-exempt wireless communication systems
S Kawade and T Hodgkinson
It explains the problems of interferences that wifi deployments suffer from. This is a barrier for the widespread of unlicensed spectrum networks. The overall performance seriously decreases when the number of users/cells is increased, specially in those cases in which there is not careful planning. The authors suggest the use of self-organizing networks that control the output power. My personal opinion is that OFDMA, MIMO, and directional arrays should be other solutions for the problem.
It explains the problems of interferences that wifi deployments suffer from. This is a barrier for the widespread of unlicensed spectrum networks. The overall performance seriously decreases when the number of users/cells is increased, specially in those cases in which there is not careful planning. The authors suggest the use of self-organizing networks that control the output power. My personal opinion is that OFDMA, MIMO, and directional arrays should be other solutions for the problem.
Thursday, September 13, 2007
Evaluating the voice capacity of 802.11 WLAN under distributed control
Nidhi Hedge, Alexandre Proutière, James Roberts.
Too many interesting things. It provides a model for the delay, that we might implement to use it to compare it to ours. Additionally, they provide a second-order moment. Their worked is based on Bianchi's.
The second part deals with traffic differentiation and I want to highlight two conclusions. First, using CWmin we can protect VoIP without affecting TCP performance. Second, by means of AIFS, the voice can be protected to the point that TCP flows starve.
They also provide expressions to calculate TCP throughput. I should review the paper after I have included TCP traffic.
Too many interesting things. It provides a model for the delay, that we might implement to use it to compare it to ours. Additionally, they provide a second-order moment. Their worked is based on Bianchi's.
The second part deals with traffic differentiation and I want to highlight two conclusions. First, using CWmin we can protect VoIP without affecting TCP performance. Second, by means of AIFS, the voice can be protected to the point that TCP flows starve.
They also provide expressions to calculate TCP throughput. I should review the paper after I have included TCP traffic.
Integration of IEEE 802.11 WLANs with IEEE 802.16-Based Multihop Infrastructure Mesh/Relay Networks: A Game-Theoretic Approach to Radio Resource Mana
Dusit Niyato and Ekram Hossain
The authors present IEEE 802.16 as a solution to backhaul traffic from WLANs. They review the state of the art and present a theoretical bargain-game to optimize the transport over the IEEE 802.16 mesh network.
The authors present IEEE 802.16 as a solution to backhaul traffic from WLANs. They review the state of the art and present a theoretical bargain-game to optimize the transport over the IEEE 802.16 mesh network.
Tuesday, August 28, 2007
Effective Bandwidth Control Policies for QoS-enabled Wireless Networks
A. Floros
I read it because it was extremely dirty and I didn't want to see it anymore on my table. It does a good job in describing IEEE802.11e admission control. However, their proposal is naive; the end note explaining that the "algorithm" is under patent revision, funny.
I read it because it was extremely dirty and I didn't want to see it anymore on my table. It does a good job in describing IEEE802.11e admission control. However, their proposal is naive; the end note explaining that the "algorithm" is under patent revision, funny.
Thursday, August 23, 2007
A Survey of Web Services in Telecommunications
Donna Griffin and Dirk Pesch
The authors suggest the implantation of SOA in telecommunication networks to facilitate the development of new services and increase revenue. The concepts of WS, SOA and EDA are explained together with the standardization bodies and standards that support them.
The authors suggest the implantation of SOA in telecommunication networks to facilitate the development of new services and increase revenue. The concepts of WS, SOA and EDA are explained together with the standardization bodies and standards that support them.
Tuesday, August 21, 2007
Reconfigurable architecture and mobility management for next-generation wireless IP networks
Jyh-Cheng Chen Jui-Hung Yeh Shao-Hsiu Hung Fu-Cheng Chen Li-Wei Lin Yi-Wen Lan
4G involves the integration of different RAN. The authors of the article propose a unique core network to which the different RAN connect. There are different existing mobility management protocols. The authors differentiate between micro-mobility and macro-mobility, and propose RAMP, a protocol that allows the coexistence of the different mobility protocols.
4G involves the integration of different RAN. The authors of the article propose a unique core network to which the different RAN connect. There are different existing mobility management protocols. The authors differentiate between micro-mobility and macro-mobility, and propose RAMP, a protocol that allows the coexistence of the different mobility protocols.
Monday, August 20, 2007
Distributed Contention Window Control for Selfish Users in IEEE 802.11 Wireless LANs
Jin, Y. Kesidis, G.
The authors assume that the users are selfish and don't follow the IEEE802.11 protocol. The users modify the value they use to multiply the contention window after a collision to maximize a utility function. The authors propose a game and find the stability points.
The math is complex.
The authors assume that the users are selfish and don't follow the IEEE802.11 protocol. The users modify the value they use to multiply the contention window after a collision to maximize a utility function. The authors propose a game and find the stability points.
The math is complex.
Thursday, July 19, 2007
Capacity of an IEEE 802.11b Wireless LAN supporting VoIP
David P. Hole and Fouad A. Tobagi
The authors present a simple bound for the capacity, and then analyze the number of possible calls taking into account delay, packet loss and desired MOS.
The authors present a simple bound for the capacity, and then analyze the number of possible calls taking into account delay, packet loss and desired MOS.
Monday, July 16, 2007
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs using Adaptive Priority Control (APC)
Sangho Shin,Henning Schulzrinne
The authors propose to increas the txop of the downlink to balance uplink and downlink delays.
The authors propose to increas the txop of the downlink to balance uplink and downlink delays.
Friday, July 13, 2007
journals
Last week I published a list of conference. In this post I will include journals...
MC2R
The Mediterranean Journal of Computers and Networks
IEEE Communication Letters
IEEE Network
Elsevier Computer Networks
International Journal on Wireless Communications and Mobile Computing
International Journal of Communication Systems
Wireless Personal Communications
AEÜ - INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS --->>> They admit letters!!
European Transaction on Telecommunications --->>> They admit letters, up to six pages, 4 figs max.
SpringerLink Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Wireless Networks (WINET)
Mobile Networks and Applications (MONET)
International Journal of Wireless Information Networks (IJWIN)
Wireless Personal Communications: An International Journal (WPC)
IEICE Transactions on Communications
IEEE Journal on Selected Areas in Communications (JSAC)
IEEE Communications Letters
IEEE Transactions on Wireless Communications
IEEE Transactions on Communications
now, when I have something to submit, it will be easier to find the right place
MC2R
The Mediterranean Journal of Computers and Networks
IEEE Communication Letters
IEEE Network
Elsevier Computer Networks
International Journal on Wireless Communications and Mobile Computing
International Journal of Communication Systems
Wireless Personal Communications
AEÜ - INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS --->>> They admit letters!!
European Transaction on Telecommunications --->>> They admit letters, up to six pages, 4 figs max.
SpringerLink Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Wireless Networks (WINET)
Mobile Networks and Applications (MONET)
International Journal of Wireless Information Networks (IJWIN)
Wireless Personal Communications: An International Journal (WPC)
IEICE Transactions on Communications
IEEE Journal on Selected Areas in Communications (JSAC)
IEEE Communications Letters
IEEE Transactions on Wireless Communications
IEEE Transactions on Communications
now, when I have something to submit, it will be easier to find the right place
mac parameter tuning for best effort traffic in 802.11e contention-based networks
It has two totally different parts. The first one addresses some differences between DCF and EDCA backoff and justify the selection of 3 as AIFS paramenter for BE traffic.
The second and more interesting one proposes a dynamic algorithm to adjust the cwmin of BE traffic. If takes into account the wasted time. If most of the time is wasted in collisions, increase CWmin. If most of the time is wasted in backoff, decrease CWmin. It works astonishing well. It maintains the maximum utilization of the network in any load conditions, and even in heterogeneous scenarios with prioritized traffic.
The second and more interesting one proposes a dynamic algorithm to adjust the cwmin of BE traffic. If takes into account the wasted time. If most of the time is wasted in collisions, increase CWmin. If most of the time is wasted in backoff, decrease CWmin. It works astonishing well. It maintains the maximum utilization of the network in any load conditions, and even in heterogeneous scenarios with prioritized traffic.
Thursday, July 5, 2007
Investigation of Bandwidth Request Mechanisms under Point-to-Multipoint Mode of WiMAX Neworks
Qiang Ni, Alexey Vinel, Yang Xiao, Andrey Turlikov, Tao Jiang
More WiMax, after a brief explanation of the scheduling alternatives it presents an analytical model. I have not quite understood the model. Even though it is essentially different from what I am working on at the 802.11, it could give me some insights in delay analysis in general
More WiMax, after a brief explanation of the scheduling alternatives it presents an analytical model. I have not quite understood the model. Even though it is essentially different from what I am working on at the 802.11, it could give me some insights in delay analysis in general
A Secure and Service-Oriented Network Control Framework for WiMAX Networks
Kejie Lu and Yi Qian and Hsiao-Hwa Chent
Using a mesh 802.16 deployment requires additional guarantees for security, specially when intermediate nodes are actually end user equipment, not controlled by the network operator. What could actually be useful to me is the security overview, to improve the security section of my article.
Maybe I have not higlighted enough that, when sharing infrastructure, tunneling offers additional value.
Using a mesh 802.16 deployment requires additional guarantees for security, specially when intermediate nodes are actually end user equipment, not controlled by the network operator. What could actually be useful to me is the security overview, to improve the security section of my article.
Maybe I have not higlighted enough that, when sharing infrastructure, tunneling offers additional value.
Thursday, June 28, 2007
TCP ACK Congestion Control and Filtering for Fairness Provision in hte Uplink of IEEE 802.11 Infrastructure Basic Service Set
Feyza Keceli, Inanc Inan, and Ender Ayanoglu
The authors separate the TCP downlink acks in a different queue. By wisely scheduling those acks, they obtain fairness among the uplink flows.
The authors separate the TCP downlink acks in a different queue. By wisely scheduling those acks, they obtain fairness among the uplink flows.
Saturation Throughput Analysis of the 802.11e Enhanced Distributed Channel Access Function
Inanc Inan, Feycza Keceli, and Ender Ayanoglu
Again, an extended Markov chain allows the inclusion of the AIFS and CWmin in the throughput calculation. It makes emphasis in that in the slots immediatly after a busy slot there are different collision probabilities, depending on the AIFS configurations of the stations
Again, an extended Markov chain allows the inclusion of the AIFS and CWmin in the throughput calculation. It makes emphasis in that in the slots immediatly after a busy slot there are different collision probabilities, depending on the AIFS configurations of the stations
Wednesday, June 27, 2007
conferences for woman (wireless open metropolitan access networks)
LANMAN -over
WMASH -dead
WCNC - Las Vegas, submission due to September
MWCN - over
INFOCOM . deadline July 2, rejection november 12
ACCESSNETS - over
QoSIP 2008 - over
QSHINE Over
ISWCS Over
MOBIQUITOUS Over
WiNTECH Over
IEEE LCN
The list:
http://wireless.cs.tku.edu.tw/~seanwang/html/research.html
WMASH -dead
WCNC - Las Vegas, submission due to September
MWCN - over
INFOCOM . deadline July 2, rejection november 12
ACCESSNETS - over
QoSIP 2008 - over
QSHINE Over
ISWCS Over
MOBIQUITOUS Over
WiNTECH Over
IEEE LCN
The list:
http://wireless.cs.tku.edu.tw/~seanwang/html/research.html
Monday, June 25, 2007
Linux for suits: Migrating a mentality
Doc Searls
The author defends that network should be treated as a facility, just as electricity, to support the rest of the economy.
The author defends that network should be treated as a facility, just as electricity, to support the rest of the economy.
open access networks
@article{edvardsen:oan,
title={{Open access networks}},
author={Edvardsen, E. and Eskedal, T.G. and Arnes, A.},
journal={Converged Networking}
}
A completely different deffinition of the OAN.
title={{Open access networks}},
author={Edvardsen, E. and Eskedal, T.G. and Arnes, A.},
journal={Converged Networking}
}
A completely different deffinition of the OAN.
Towards an Economic Framework for Network Neutrality Regulation
Barbara van Schewick
A forty-page analysis of the network neutrality discussion. The network providers have incentives to discriminate, even in the case that they do not hold a monopoly position. This discrimination would have disastrous impact on the innovation in the application level and therefore network neutrality should be enforced by regulators.
A forty-page analysis of the network neutrality discussion. The network providers have incentives to discriminate, even in the case that they do not hold a monopoly position. This discrimination would have disastrous impact on the innovation in the application level and therefore network neutrality should be enforced by regulators.
Wednesday, June 20, 2007
100+ VoIP Calls on 802.11b: The Power of Combining Voice Frame Aggregation and Uplink-Downlink Bandwidth Control in Wireless LANs
Sangki Yun, Hyogon Kim, Heejo Lee, and Inhye Kang
Very interesting... so many things to summarize! Deals with uplink/downlink unfairness aspects, packet aggregation at the MAC level, E-model.
The key idea is that the channel access is the main overhead in VoIPoWLAN. Thus aggregating packets belonging to the same call at the mac level drastycally boosts the performance.
Very interesting... so many things to summarize! Deals with uplink/downlink unfairness aspects, packet aggregation at the MAC level, E-model.
The key idea is that the channel access is the main overhead in VoIPoWLAN. Thus aggregating packets belonging to the same call at the mac level drastycally boosts the performance.
Tuesday, June 19, 2007
Performance Analysis of the WLAN-First Scheme in Cellular WLAN Interworking
Song, Jiang, Zhuang
I've been studying IMS-WLAN interworking and there is people in the group focusing on CAC, VoIP QoS in WLAN, and capacity studies in heterogeneous (voice/data) scenarios. Thus this paper promises to bridge this topics.
The different behaviour/capacity of cell and wlan, and the different behaviour of users in both environments (assumed outdoor and indoor) makes it difficult to decide how to assign user to one or the other technology. Since the performance of VoIP on wlan is poor, it seems natural to as many data sessions as possible to the wlan.
I've been studying IMS-WLAN interworking and there is people in the group focusing on CAC, VoIP QoS in WLAN, and capacity studies in heterogeneous (voice/data) scenarios. Thus this paper promises to bridge this topics.
The different behaviour/capacity of cell and wlan, and the different behaviour of users in both environments (assumed outdoor and indoor) makes it difficult to decide how to assign user to one or the other technology. Since the performance of VoIP on wlan is poor, it seems natural to as many data sessions as possible to the wlan.
Monday, June 18, 2007
wlan sharing - alternatives
This are different alternatives to share wlan.
- Neutral Operator (kth, barcelona...)
- Tunneling (Urbino)
- IMS-like (involving tunnels)
- Radius relay (Eduroam, WISPr)
- Wilmagate (Like Radius relay, without radius)
- Multiple ssid, multiple wlan
- WLAN differentiation using capwap
Maybe it would be interesting to review all the existing alternatives and compare thems in terms of
- convenince
- security
- matureness
- scalability
- Neutral Operator (kth, barcelona...)
- Tunneling (Urbino)
- IMS-like (involving tunnels)
- Radius relay (Eduroam, WISPr)
- Wilmagate (Like Radius relay, without radius)
- Multiple ssid, multiple wlan
- WLAN differentiation using capwap
Maybe it would be interesting to review all the existing alternatives and compare thems in terms of
- convenince
- security
- matureness
- scalability
3GPP TS 23.234
Wireless Local Area Network interworking system description
Describes how a WLAN can be used to access 3gpp ims ps domain. I am specially interested in policy/QoS aspects.
Describes how a WLAN can be used to access 3gpp ims ps domain. I am specially interested in policy/QoS aspects.
Wednesday, June 13, 2007
MAC Access Delay of IEEE 802.11 DCF
Taka Sakurai, Hai L. Vu
Even though 802.11 dcf has been extensively studied, it seem that there is still room for more research. In this case, building up previous work by Kwak Song and Miller, the access delay is calculated, obtaining more accurate results than other authors.
Even though 802.11 dcf has been extensively studied, it seem that there is still room for more research. In this case, building up previous work by Kwak Song and Miller, the access delay is calculated, obtaining more accurate results than other authors.
Tuesday, June 5, 2007
Fairness Provision in the IEEE 802.11e Infrastructure Basic Service Set
Inanc Inan, Feyza Keceli, and Ender Ayanoglu
Closely related to our current work, they actually stepped forward. However, it's reconforting to see that other people focus on the same research, it makes you think that it's not completely worthless.
The authors highlight the fact that the default values for the EDCA are suboptimum. Moreover, no fixed set of parameters can fight the uplink/downlink fairness. They provide an analytical model and an extensive set of simulated scenarios involving TCP and UDP traffic.
Closely related to our current work, they actually stepped forward. However, it's reconforting to see that other people focus on the same research, it makes you think that it's not completely worthless.
The authors highlight the fact that the default values for the EDCA are suboptimum. Moreover, no fixed set of parameters can fight the uplink/downlink fairness. They provide an analytical model and an extensive set of simulated scenarios involving TCP and UDP traffic.
Monday, May 21, 2007
Implementing a Native IMS Location Service Enabler over a Prototypical IMS Core Network Testbed
Peter Reichl1, Sandford Bessler1, Joachim Fabini2, Rudolf Pailer3, Joachim Zeiss1
It proposes a location architecture that has nothing to do with TS 23.271. It is based on GPS-enabled terminals and integrates with presence information. They have actually implemented a testbed.
It proposes a location architecture that has nothing to do with TS 23.271. It is based on GPS-enabled terminals and integrates with presence information. They have actually implemented a testbed.
Friday, May 18, 2007
IMS Interoperability and Conformance Aspects
Mischa Schmidt, Andreas Wilde and Anett Schülke Henrique Costa
Describes the importance of the interoperability tests organized by various organizations.
Describes the importance of the interoperability tests organized by various organizations.
Interworking of Wimax and 3GPP Networks based on IMS
Fangmin Xu, Luyong Zhang, and Zheng Zhou
The authors reproduce part of the work of 3GPP in WLAN- IMS internetworking, introduce the QoS capabilities of IMS, and finally describe QoS guarantees, AAA provision, and security. It seems to me that it is not a closed and clear solution, but at least is some talk about our topic of interest.
The authors reproduce part of the work of 3GPP in WLAN- IMS internetworking, introduce the QoS capabilities of IMS, and finally describe QoS guarantees, AAA provision, and security. It seems to me that it is not a closed and clear solution, but at least is some talk about our topic of interest.
Thursday, May 17, 2007
Location-based services -- an overview of the standards
P M Adams, G W B Ashwell and R Baxter
This documents describe the trajectory and organization of different standard bodies that influence in the location services. Quite useful.
This documents describe the trajectory and organization of different standard bodies that influence in the location services. Quite useful.
Tuesday, May 15, 2007
3GPP TS 23.207 V6.6.0 (2005-09)
3rd Generation Partnership Project;
Technical Specification Group Services and System Aspects;
End-to-end Quality of Service (QoS) concept and architecture
(Release 6)
This time we are talking about GPRS and end-to-end. Much more complete than the previous. I clarifies that the AF can be the CSCF. The Gq and Go Interface are also described. It also esplains that both DS (differentiated services) and RSVP can be used to guarantee QoS in the IP core network and remote link. It assumes that since GPRS is used in the local link, the PDP flow already has QoS guarantees.
The diffserv is already supported in WMM, so it seems the more straight-forward approach.
Technical Specification Group Services and System Aspects;
End-to-end Quality of Service (QoS) concept and architecture
(Release 6)
This time we are talking about GPRS and end-to-end. Much more complete than the previous. I clarifies that the AF can be the CSCF. The Gq and Go Interface are also described. It also esplains that both DS (differentiated services) and RSVP can be used to guarantee QoS in the IP core network and remote link. It assumes that since GPRS is used in the local link, the PDP flow already has QoS guarantees.
The diffserv is already supported in WMM, so it seems the more straight-forward approach.
3GPP TS 29.208 V6.6.1 2006-03
3rd Generation Partnership Project,
Technical Specification Group Core Network and Terminals;
End-to-end Quality of Service (QoS) signalling flows (release 6)
This document describes QoS reservation in local IP-CAN for the case of cellular networks. It should not be difficult to adapt it to the WLAN case... the AF and PDF should stay the same... then the SGSN and GGSN should be substited... but for what?
An appendix describes the mapping from SDP parameters to Maximum Authorized parameters
Technical Specification Group Core Network and Terminals;
End-to-end Quality of Service (QoS) signalling flows (release 6)
This document describes QoS reservation in local IP-CAN for the case of cellular networks. It should not be difficult to adapt it to the WLAN case... the AF and PDF should stay the same... then the SGSN and GGSN should be substited... but for what?
An appendix describes the mapping from SDP parameters to Maximum Authorized parameters
Friday, May 11, 2007
Policy-Based QoS Management Architecture in an Integrated UMTS and WLAN Environment
Wei Zhuang, Yung-Sze Gan,Kok-Jen, and Kee-Chaing Chua
I read it a long time ago, and have re-read it a couple of times since them. It describes some policy-related entities and interactions for wlan-umts internetworking. It can be used as a base, but definetly not as a closed solution. I plan to write a technical report next month. Then it might be converted to an article o can be the basis of my thesis...
I read it a long time ago, and have re-read it a couple of times since them. It describes some policy-related entities and interactions for wlan-umts internetworking. It can be used as a base, but definetly not as a closed solution. I plan to write a technical report next month. Then it might be converted to an article o can be the basis of my thesis...
ETSI TR 122 934 v6.2.0(2003-09)
Universal Mobile Telecommunications System (UMTS) Feasibility study on 3GPP system to Wireless Local Area Network (WLAN) interworking
It describes differetn scenearios for internetworking, places some requirements, but no technical solutions at all.
It describes differetn scenearios for internetworking, places some requirements, but no technical solutions at all.
Thursday, May 10, 2007
Bringing Location Based Services to IP Multimedia Subsystem
Miran Mosmondor, Lea Skorin-Kapov Marko Kovacic
I'm interested in finding out which is the state-of-the-art of collecting, managing and distributing location information in the IMS. This paper presents an architecture that uses SIP mechanisms and the aplication server concept. The application servers ask using a SIP protocol to a centralized entity. This entity interacts with the server that actually contains the location information using MLP.
IMHO, these should not be the way of handling the location information since it should be closely tight to the presence information.
I'm interested in finding out which is the state-of-the-art of collecting, managing and distributing location information in the IMS. This paper presents an architecture that uses SIP mechanisms and the aplication server concept. The application servers ask using a SIP protocol to a centralized entity. This entity interacts with the server that actually contains the location information using MLP.
IMHO, these should not be the way of handling the location information since it should be closely tight to the presence information.
Monday, May 7, 2007
Towards an Innovation Oriented IP Multimedia Subsystem
Gonzalo Camarillo, Tero Kauppinen, Marti Kuparinen, Ignacio Más Ivars
This article proposes a new policy-enforcement mechanism for IMS based on the notify/subscribe methods. This can be very useful to Anna to notify nodes that they must change their codecs.
This article proposes a new policy-enforcement mechanism for IMS based on the notify/subscribe methods. This can be very useful to Anna to notify nodes that they must change their codecs.
Experiencing with Blending HTTP, RTSP, and IMS
Sohel Q.Khan, Robert Gaglianello, Michael Luna
SIP, RTSP and HTTP use different networks (I gess this refers to the application level).The author proposes to unify this networks to reduce overall complexity and mainteinance costs.
SIP, RTSP and HTTP use different networks (I gess this refers to the application level).The author proposes to unify this networks to reduce overall complexity and mainteinance costs.
The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds
G Camarillo, MA García-Martín
All ablut SIP, compared to the conventional Internet. Specially intereting was finding that the cell information is actually conveyed in SIP messages. It is also explained how policies are enforced. However, a new policy enforcement technique is detailed in a later article.
All ablut SIP, compared to the conventional Internet. Specially intereting was finding that the cell information is actually conveyed in SIP messages. It is also explained how policies are enforced. However, a new policy enforcement technique is detailed in a later article.
Sunday, May 6, 2007
Service Delivery Platforms in Practice
Christofer J. Pavlovski
I didn't understand what was the article about. However, I realized an evil use of initialism in which SDP stands for Service Delivery Platform -not session description protocol- and OSS is Operational Support Systems -not open source software.
But there is something useful in the article, the fact that gaming, music and gaming are the most cost-effective services for deployment, so I will probably cite it when I write my journal about location.
I didn't understand what was the article about. However, I realized an evil use of initialism in which SDP stands for Service Delivery Platform -not session description protocol- and OSS is Operational Support Systems -not open source software.
But there is something useful in the article, the fact that gaming, music and gaming are the most cost-effective services for deployment, so I will probably cite it when I write my journal about location.
Saturday, May 5, 2007
TCP Fairness in 802.11e WLANs
D. J. Leith, P. Clifford, D. Malone, and A. Ng
In this article the authors present to unfairness issues in 802.11. First, unfairness between uplink flows due to the irregular delivery of ack packets. And then, the unfairness between uplink and downlink flows because all the downlink flows have to be submitted from de same node (the AP). They already suggest using TXOP to fight this last problem. Concerning the former problem, they propose a separate queue for ACK packets.
Our contribution will be quantify the unfairness by means of simulation, propose TXOP values, and show that the separate queue is unnecessary, since the txop alone is enough to solve the problem.
In this article the authors present to unfairness issues in 802.11. First, unfairness between uplink flows due to the irregular delivery of ack packets. And then, the unfairness between uplink and downlink flows because all the downlink flows have to be submitted from de same node (the AP). They already suggest using TXOP to fight this last problem. Concerning the former problem, they propose a separate queue for ACK packets.
Our contribution will be quantify the unfairness by means of simulation, propose TXOP values, and show that the separate queue is unnecessary, since the txop alone is enough to solve the problem.
Tuesday, April 17, 2007
A MAC parameter optimization scheme for IEEE 802.11e-based multimedia home networks
Minyoung Sung; Namhyun Yun
They calculated some delay(rigid) vs throughput(elastic) curves by means of simulation. Then they propose that the AP, depending on the accepted rigid flows and the required delay, decides the most appropriate parameter set.
It did not give me a very good impresion. It reduces the number of possible flows/bitrates. Gives examples that are surprising (required delay 1ms); It obviates the jitter... however it is very similar to the thing we want to do...
They calculated some delay(rigid) vs throughput(elastic) curves by means of simulation. Then they propose that the AP, depending on the accepted rigid flows and the required delay, decides the most appropriate parameter set.
It did not give me a very good impresion. It reduces the number of possible flows/bitrates. Gives examples that are surprising (required delay 1ms); It obviates the jitter... however it is very similar to the thing we want to do...
A CAPWAP Architecture for Dynamic Configuration of QoS MAC Parameters
A. Banchs∗ , G. Iannello† , P. Serrano∗ and L. Vollero
Our focus has been until now on a single-cell scenario. However, as explained in this article, the aparition of the CAPWAP standard will allow the centralized management of a number of STAs. The QoS management could then also be centralized, providing a better scenario for handling handovers. In the last part of the article, the authors propose a number of rules to determine EDCA parameters. However, it is not clear to me how the first and the second parts are linked.
Our focus has been until now on a single-cell scenario. However, as explained in this article, the aparition of the CAPWAP standard will allow the centralized management of a number of STAs. The QoS management could then also be centralized, providing a better scenario for handling handovers. In the last part of the article, the authors propose a number of rules to determine EDCA parameters. However, it is not clear to me how the first and the second parts are linked.
Friday, April 13, 2007
Experimental Evaluation of TCP Performance and Fairness in an 802.11e Test-bed
Anthony C.H. Ng, David Malone, Douglas J. Leith
The authors build a testbed and compare the results with the ones obtained from analytical models. Additionally they present the uplink/downlink impairment performance (without any citation) and implement and validate a solution presented in other paper (this time there is a citation).
The authors build a testbed and compare the results with the ones obtained from analytical models. Additionally they present the uplink/downlink impairment performance (without any citation) and implement and validate a solution presented in other paper (this time there is a citation).
Tuesday, April 10, 2007
Understanding TCP fairness over Wireless LAN
Saar Pilosof, Ramachandran Ramjee, Danny Raz, Yuval Shavitt and Prasun Sinha
Yet another performance imparement due to the .11/TCP combination. In this case, the culprit is the AP buffer limited size. Discarding a downstream data packet has a greater impact than discarding a (down-going) ACK of an upstream flow.
The anomaly is observed, analyzed and simulated. A solution is also suggested, involving the manipulation of the TCP packets.
Yet another performance imparement due to the .11/TCP combination. In this case, the culprit is the AP buffer limited size. Discarding a downstream data packet has a greater impact than discarding a (down-going) ACK of an upstream flow.
The anomaly is observed, analyzed and simulated. A solution is also suggested, involving the manipulation of the TCP packets.
The 3G IMS
I got a few ideas from that book. Concerning QoS, I discovered that there are headers that explicitely detail the required bandwidth for the requested flows. I understood when the resource reservation is performed and how a S-CSCF can apply a policy to an INVITE and reject such invite according to the requested codecs.
Concerning the location/position information, I discovered that IMS messages convey the cell information. However, these headers are removed as soon as the messages are forwarded to foreign networks.
Concerning the location/position information, I discovered that IMS messages convey the cell information. However, these headers are removed as soon as the messages are forwarded to foreign networks.
Thursday, March 29, 2007
is the uplink control enough to guarantee downlink control
Imagine a scenario in which STAs from different providers contend for the bandwith of a single AP. Our reasoning is that the BE downlink traffic will dominate, since P2P and other symmetrical BE applications are not so popular as web browsing or media downloading in wifi scenarions.
802.11e provides us with the tools to control the uplink traffic, by assigning different EDCA parameters to each contending STA. And the one-million-dollar-question is... "Is this uplink control enough to control downlink flows as well".
TCP might help us in that direction, but we will need to simulate to find out... Teach me NS2!
802.11e provides us with the tools to control the uplink traffic, by assigning different EDCA parameters to each contending STA. And the one-million-dollar-question is... "Is this uplink control enough to control downlink flows as well".
TCP might help us in that direction, but we will need to simulate to find out... Teach me NS2!
Using the 802.11e EDCF to Achieve TCP Upload Fairness over WLAN Links
D.J. Leith, P.Clifford
It studies the combined contention effects of TCP and DCF on uploading stations. NS2 simulations show a lockout problem that can be solved by giving preference to ack packets.
The authors also explain that in occasions in which the wireless hop is the bottleneck, the TCP dynamics are different from the traditional wired case.
It studies the combined contention effects of TCP and DCF on uploading stations. NS2 simulations show a lockout problem that can be solved by giving preference to ack packets.
The authors also explain that in occasions in which the wireless hop is the bottleneck, the TCP dynamics are different from the traditional wired case.
Tuesday, March 27, 2007
Online Association Policies in IEEE 802.11 WLANs
Gaurav S. Kasbekar, Joy Kuri and Pavan Nuggehalli
Oops I did it again, I read a paper that i cannot understand because I lack the mathematical background. It finds the optimal heuristic for a AP to chose to which AP to attach, and proves that its better that other policies.
There is a reference I want to read:
[6] A. Kumar, E. Altman, D. Miorandi, and M. Goyal, “New insights from a
fixed point analysis of single cell IEEE 802.11 WLANs,” in Proceedings
of the IEEE Infocom, 2005.
Oops I did it again, I read a paper that i cannot understand because I lack the mathematical background. It finds the optimal heuristic for a AP to chose to which AP to attach, and proves that its better that other policies.
There is a reference I want to read:
[6] A. Kumar, E. Altman, D. Miorandi, and M. Goyal, “New insights from a
fixed point analysis of single cell IEEE 802.11 WLANs,” in Proceedings
of the IEEE Infocom, 2005.
Tuesday, March 20, 2007
joining forces
After reading the last paper it appears clear to me that it is extremely difficult to write a good paper alone. The bibliography is so extense and the concepts so many, that team work is necessary to obtain medium or good results.
A Cross-Layer Approach for WLAN Voice Capacity Planning
Yu Cheng,Xinhua Ling,Wei Song, Lin X. Cai, Weihua Zhuang, Xuemin Shen
Interesting ingredients. A DCF-EDCA model with some similitudes with Boris', the idea of multiplexing downlink flows at the AP, my idea of dropping packets instead of retransmitting. Worth a second read...
Interesting ingredients. A DCF-EDCA model with some similitudes with Boris', the idea of multiplexing downlink flows at the AP, my idea of dropping packets instead of retransmitting. Worth a second read...
Hotspot Traffic Statistics and Throughput Models for Several Applications
Chen Na, Jeremy K. Chen, and Theodore S. Rappaport
Traffic analysis, inbound/outbound, throughput/SNR, blah blah... I'm more interested in a multiple user scenario, and this paper offers a reference...
[13] "Throughput measurements and models of Public IEEE 802.11b Wireless Local Area Networks". However, being the paper from the same authors, I don't fell like reading it. Not now.
Traffic analysis, inbound/outbound, throughput/SNR, blah blah... I'm more interested in a multiple user scenario, and this paper offers a reference...
[13] "Throughput measurements and models of Public IEEE 802.11b Wireless Local Area Networks". However, being the paper from the same authors, I don't fell like reading it. Not now.
Characterizing the IEEE 802.11 Traffic: The Wireless Side
Jihwang Yeo, Moustafa Youssef, Ashok Agrawala
First I have to say that I have not read the complete article. The appendices are so long that maybe it contains 30 pages alltogether. It performs a study listening the wireless medium and the conclusion is that less-than-optimal performance comes from less-than-optimal implementation of the protocol. Control frames are unnecessarily retransmitted and the selection of the bitrate is not in accordance of the actual SNR conditions. It is good to know but, from my point of view, in does not affect our research directly.
First I have to say that I have not read the complete article. The appendices are so long that maybe it contains 30 pages alltogether. It performs a study listening the wireless medium and the conclusion is that less-than-optimal performance comes from less-than-optimal implementation of the protocol. Control frames are unnecessarily retransmitted and the selection of the bitrate is not in accordance of the actual SNR conditions. It is good to know but, from my point of view, in does not affect our research directly.
Sunday, March 18, 2007
On the Performance Characteristics of WLANS:Revisited
Anand Balachadran, Geoffrey M. Voelker, Paramvir Bahl, P. Venkal Rangan
I love this paper.It basically takes all the findings that simulation-guys have been writing tons of papers about and says: this is bullshit, it has nothing to do with real world.
Now, what are the most interesting contributions... first it says that TCP and DCF make good friends, specially when the wireless terminals are clients downloading from the net. In this situation, the download throughput remains constant, no matter how many STAs enter into the network (up to 100).
HOWEVER, when the wlan reaches the saturation point, jitter and delays rise suddenly. This is not good for MM :-)
And this is funny: the automatic rate-adaption in 802.11 actually worsens the performance of .11 . It goes like this: when congestion occurs and a STA loses two consecutive packets due to collisions, the station changes to a lower rate effectively increasing the congestion.
And my conclusions: The DCF-TCP is the perfect team for web browsing, and file downloading from the net. However, as soon as new applications appear such as MM streaming, VoIP, P2P,... dcf can be a disaster. Would .11e be powerful enough to alleviate this situation?
I love this paper.It basically takes all the findings that simulation-guys have been writing tons of papers about and says: this is bullshit, it has nothing to do with real world.
Now, what are the most interesting contributions... first it says that TCP and DCF make good friends, specially when the wireless terminals are clients downloading from the net. In this situation, the download throughput remains constant, no matter how many STAs enter into the network (up to 100).
HOWEVER, when the wlan reaches the saturation point, jitter and delays rise suddenly. This is not good for MM :-)
And this is funny: the automatic rate-adaption in 802.11 actually worsens the performance of .11 . It goes like this: when congestion occurs and a STA loses two consecutive packets due to collisions, the station changes to a lower rate effectively increasing the congestion.
And my conclusions: The DCF-TCP is the perfect team for web browsing, and file downloading from the net. However, as soon as new applications appear such as MM streaming, VoIP, P2P,... dcf can be a disaster. Would .11e be powerful enough to alleviate this situation?
UniWireless: a Distributed Open Access Network
Danilo Severina, Mauro Brunato, Alessandro Ordine, Luca Veltri
Why is this paper important? First because they work on the OAN concept ant present a paper in WMASH every year. Second, because they ignored our contributions and failed to reference us year after year.
Third, and least important, because they introduce SIP register as a new authentication mechanism. The idea is brilliant, and actually is a topic of my interest, but imho the execution is poor. They include new SIP headers and mechanism to solve pass authentication information from proxy to proxy. And my question is ... Why making it so complicate instead of using IMS' well-known and extensevely tested procedures?
Why is this paper important? First because they work on the OAN concept ant present a paper in WMASH every year. Second, because they ignored our contributions and failed to reference us year after year.
Third, and least important, because they introduce SIP register as a new authentication mechanism. The idea is brilliant, and actually is a topic of my interest, but imho the execution is poor. They include new SIP headers and mechanism to solve pass authentication information from proxy to proxy. And my question is ... Why making it so complicate instead of using IMS' well-known and extensevely tested procedures?
Friday, March 16, 2007
Secure Access to IP Multimedia Services Using Generic Bootstrapping Architecture (GBA) for 3G & Beyond Mobile Networks
Muhammad Sher Thomas Magedanz
What I want to know is how a UE accesses the Internet (for example, for web browsing) in a IMS environment. In this paper the bootstrap procedure that allows a ue to access a IMS services from a generic network. It is somehow related to what I wanted, but not what I wanted...
For me it is more or less clear how the ue accesses sip-based applications through the IMS proxies, but not how non-sip based Internet applications are used...
What I want to know is how a UE accesses the Internet (for example, for web browsing) in a IMS environment. In this paper the bootstrap procedure that allows a ue to access a IMS services from a generic network. It is somehow related to what I wanted, but not what I wanted...
For me it is more or less clear how the ue accesses sip-based applications through the IMS proxies, but not how non-sip based Internet applications are used...
Thursday, March 15, 2007
Comprehensive Analysis of the IEEE 802.11
PETER P. PHAM
It seems that I finally found what I was looking for. This articles might contain the formulas that I can use for my ideas.
It seems that I finally found what I was looking for. This articles might contain the formulas that I can use for my ideas.
Resource Control for the EDCA Mechanism in Multi-Rate IEEE 802.11e Networks
Vasilios A. Siris Costas Courcoubetis
The article uses pricing to obtain best utilization of the wireless channel using EDCA. I had already read some papers about using pricing in response to congestion.
However, I'm more interested in some of the references which can provide me with the formulas/approximations required for my next article.
The article uses pricing to obtain best utilization of the wireless channel using EDCA. I had already read some papers about using pricing in response to congestion.
However, I'm more interested in some of the references which can provide me with the formulas/approximations required for my next article.
Tuesday, March 13, 2007
Performance Analysis and Enhancements for IEEE 802.11e Wireless Networks
Qiang Ni, National University of Ireland
This paper is a *MUST*. The one you should begin with. Well-written, comprehensive,... all you need to know about .11e... specially if you expect to understand any of the others papers.
This paper is a *MUST*. The one you should begin with. Well-written, comprehensive,... all you need to know about .11e... specially if you expect to understand any of the others papers.
idea: multi-tiered CAC
It might seem trivial to you, dear reader, but it took me three weeks to realize what's my next pape r about.
This is my conclusion:
Step 1: Take any CAC
Step 2: Say that in addition to differentiate between VO and BE, we want to offer different QoS to paying and non-paying users.
Time to write?
This is my conclusion:
Step 1: Take any CAC
Step 2: Say that in addition to differentiate between VO and BE, we want to offer different QoS to paying and non-paying users.
Time to write?
idea: Using neighbour cells population together with to compute roaming probability
The probability that a call roams into our cell highly depends on the number of ongoing calls in the neighbouring cells. This information could be used to compute guard channels etc.
Extending End-to-End QoS to WiFi based WLAN
http://www.cswl.com/whitepapers/qos-wireless-lan.html
Plain and clear. QoS in WLAN and interaction with SIP. It does not specify the details. Which could be our contribution? A problem to be solved (inmho) is the mapping from a codec specified in SDP to a TSPEC, and then (taking into account current traffic conditions) the conversion to EDCA parameters.
Plain and clear. QoS in WLAN and interaction with SIP. It does not specify the details. Which could be our contribution? A problem to be solved (inmho) is the mapping from a codec specified in SDP to a TSPEC, and then (taking into account current traffic conditions) the conversion to EDCA parameters.
Monday, March 12, 2007
WLAN Manager (WM): a Device for Performance Management of a WLAN
Malati Hegde† , S.V.R Anand† , Anurag Kumar† , and Joy Kuri‡
The most useful idea that we can obtain from this article is that the access point controller defined by CAPWAP can be the actual policy enforcement point.
The details about how to obtain "fairnes" understood as giving more throughput to the users with higher rates by recdistributing the packets in the queues and pinging the STA to find out their rates seemed to me a bad idea. Additionally, there are typos. So I decided to read only journal papers from now on. I was surprised when I realized that this was a journal paper :-(
The most useful idea that we can obtain from this article is that the access point controller defined by CAPWAP can be the actual policy enforcement point.
The details about how to obtain "fairnes" understood as giving more throughput to the users with higher rates by recdistributing the packets in the queues and pinging the STA to find out their rates seemed to me a bad idea. Additionally, there are typos. So I decided to read only journal papers from now on. I was surprised when I realized that this was a journal paper :-(
Localizing the Internet, Five Ways Public Ownership Solves the U.S. Broadband Problem
Becca Vargo Dagget
An extensive study of the last mile bottleneck in the U.S. The author defents municipality owned access network to foster competence, assure network neutrality, universal service, higher incomes for the municipality and lower prices for the users.
It contains case studies and success stories.
An extensive study of the last mile bottleneck in the U.S. The author defents municipality owned access network to foster competence, assure network neutrality, universal service, higher incomes for the municipality and lower prices for the users.
It contains case studies and success stories.
Thursday, March 8, 2007
LocustWorld Mesh explained
Jon@LocustWorld.com
Similary to linux live CDs, LocustWorld provides a boot CD that converts the PC in the node of a mesh network. We sould try it and think how it could be useful to us.
Similary to linux live CDs, LocustWorld provides a boot CD that converts the PC in the node of a mesh network. We sould try it and think how it could be useful to us.
Wednesday, March 7, 2007
idea- dropping delayed voice packets at the MAC layer
It seems to me that the use of Access Categories in EDCA is unfair by definition. A user might decide to place all its traffic (even if is P2P file sharing ) in a high priority queue. That user will obtain higher bitrates and lower latency at the expense of the users that place each kind of traffic to the appropriate queue.
Additionally, delayed voice packet might be useless at the receptor. If a packet voice is delayed due to retransmission attempts, it will provoke the delay of the rest of the packets in the queue and could happen that all of them had to be dropped because the delay budget has been exceeded.
My proposal is that if a voice packet suffers a collision, it should be dropped and the contention window for the following packet should be doubled. With my proposal, the high priority queues will obtain higher bit rates and lower delays (thanks to shorter AIFS and smaller contention windows). On the other hand, lower priority queues will obtain higher reliability thanks to the retransmission mechanism.
Additionally, delayed voice packet might be useless at the receptor. If a packet voice is delayed due to retransmission attempts, it will provoke the delay of the rest of the packets in the queue and could happen that all of them had to be dropped because the delay budget has been exceeded.
My proposal is that if a voice packet suffers a collision, it should be dropped and the contention window for the following packet should be doubled. With my proposal, the high priority queues will obtain higher bit rates and lower delays (thanks to shorter AIFS and smaller contention windows). On the other hand, lower priority queues will obtain higher reliability thanks to the retransmission mechanism.
A performance study on the service integration in IEEE 802.11e wireless LAN
Frank Roijers, Hans van den Berg, Xiang Fan, Maria Fleuren
The goal of the article is to compare the influence of different EDCA parameters in the performance metrics of different fluxes by means of simulation.
There is a mistake in fig 3. According to this plot (Fig. 3, right), stations with a lower CWmin (7) obtain a lower throuhput than those with a higher CWmin (31).
The article offer a visual explanation of the effect of tuning the different EDCA parameters.
The goal of the article is to compare the influence of different EDCA parameters in the performance metrics of different fluxes by means of simulation.
There is a mistake in fig 3. According to this plot (Fig. 3, right), stations with a lower CWmin (7) obtain a lower throuhput than those with a higher CWmin (31).
The article offer a visual explanation of the effect of tuning the different EDCA parameters.
An Admission Control Heuristic for IEEE 802.11e Wireless LANs
Bechir Hamdaoui, Moncef Elaoud, Parameswaran Ramanathan
It proposes a CAC mechanism similar to the one that Cristina presented in one of the NeTS seminars. The different lays in the model that is used to calculate the delays suffered by the multimedia packets. It seems that the model together with the CAC mechanism successfully predicts the number of VoIP calls that an AP can support, compared to simultion.
It does not contemplate channel errors nor rate adaption.
I lack the mathematical knowledge to fully understand the model and therefore I should re-read the paper and check the different steps one-by-one.
It proposes a CAC mechanism similar to the one that Cristina presented in one of the NeTS seminars. The different lays in the model that is used to calculate the delays suffered by the multimedia packets. It seems that the model together with the CAC mechanism successfully predicts the number of VoIP calls that an AP can support, compared to simultion.
It does not contemplate channel errors nor rate adaption.
I lack the mathematical knowledge to fully understand the model and therefore I should re-read the paper and check the different steps one-by-one.
idea
It seems that most of the aspects of 11e and 11r have been studied. So let's focus on the multi-operator environment. Let's assume that two different operators share an access point broadcasting two different ssids. What's the impact of the traffic of one operator on the QoS of the other operator?
Tuesday, March 6, 2007
Performance Study of Fast BSS Transition using IEEE 802.11r
Sangeetha Bangolae Carol Bell Emily Qi
Her lays the answer to the previous post. The negotiation can be done prior to roaming. Additionally the STA can, can request roaming to different APs, and then choose one to roam.
Her lays the answer to the previous post. The negotiation can be done prior to roaming. Additionally the STA can, can request roaming to different APs, and then choose one to roam.
idea
What happens with QoS negotiation in 802.11r? Should it be negotiated *before* handover? What can we propose?
Integrating SIP and IEEE 802.11e to Support Handoff and Multi-grade QoS for VoIP Applications
Jen-Jee Chen Ling Lee Yu-Chee Tseng
Very complete! It addresses...
(1) Handoff
(2) Multigrade QoS
(3) Multirate
(4) Multiple codecs
(5) A bit of SIP
(6) Call Admission Control
(7) Resource re-Adjustment
What else can we add...
(1) Including location information to estimate the handoff probability (Ph).
(2) Using Boris-Model (Bandwidth-Orinented Resource Inferring System) to calculate the resource utilization of a new flux.
Very complete! It addresses...
(1) Handoff
(2) Multigrade QoS
(3) Multirate
(4) Multiple codecs
(5) A bit of SIP
(6) Call Admission Control
(7) Resource re-Adjustment
What else can we add...
(1) Including location information to estimate the handoff probability (Ph).
(2) Using Boris-Model (Bandwidth-Orinented Resource Inferring System) to calculate the resource utilization of a new flux.
Friday, March 2, 2007
Design of QoS and Admission Control for VoIP Services over IEEE 802.11e WLANs
Pei-Yeh Wu1 , Yu-Chee Tseng1 , and Hewitt Lee2
Very complete and extense (25 pags). A good place to begin with. Explains all the basic concepts. Introduction of tutorial nature. It makes a shy attempt to link SIP and EDCA. It addresses codec selection and Packitization Intervals.
Very complete and extense (25 pags). A good place to begin with. Explains all the basic concepts. Introduction of tutorial nature. It makes a shy attempt to link SIP and EDCA. It addresses codec selection and Packitization Intervals.
Thursday, March 1, 2007
New QoS Control Mechanism Based on Extensions to SIP for Access to UMTS Core Network via Different Kinds of Access Networks
Mehdi Mani, Student Member, IEEE ,Noël Crespi
Very interesting. Bad English. It addresses architectural issues, SIP integration, IMS... . It includes a testbed using WLAN. It lacks the use of EDCA as QoS mechanism. That could be our contribution.
Very interesting. Bad English. It addresses architectural issues, SIP integration, IMS... . It includes a testbed using WLAN. It lacks the use of EDCA as QoS mechanism. That could be our contribution.
Wireless LAN Resource Management Mechanism Guaranteeing Minimum Available Bandwidth for Real-time Communication
Toshihiko Tamura and Tadashi Ito
Well written paper. It addresses the codec adaptation in combination with SIP and 802.1X. It introduces AP-RMS (AP-Resource Management Service). However, it leaves as future work the task of considering rate adaptation, or EDCA parameter tuning. IMHO, their work can be very well complemented by Boris and Anna's solutions.
Well written paper. It addresses the codec adaptation in combination with SIP and 802.1X. It introduces AP-RMS (AP-Resource Management Service). However, it leaves as future work the task of considering rate adaptation, or EDCA parameter tuning. IMHO, their work can be very well complemented by Boris and Anna's solutions.
A Priority Control Method for High quality VoIP Systems over Wireless LAN
R. Matsukura, H. Ymauchi, S. Okuyama, M. Matsuda, M. Sumioka
Badly written, hard to read. The contributions are not clear. It might be of interest because addresses a topic related to our work.
Badly written, hard to read. The contributions are not clear. It might be of interest because addresses a topic related to our work.
Monday, February 26, 2007
A Dynamic Load Balancing Scheme for VoIP over WLANs
Chih-Chien Hsu and Shiao-Li Tsao
It proposes re-allocating calls from one ap to another to be able to admit more calls. The most interesting is representing the reallocation problem as a graph. It might be extended to mesh networks.
It proposes re-allocating calls from one ap to another to be able to admit more calls. The most interesting is representing the reallocation problem as a graph. It might be extended to mesh networks.
Low-Resource Routing Attacks Against Anonymous Systems
Kevin Bauer, Damon McCoy, Dirk Grunwald, Tadayoshi Kohno, Douglas Sicker
Interesting description of the Tor anonymazer system and a possible attack against it.
Interesting description of the Tor anonymazer system and a possible attack against it.
A Novel AP for Improving the Performance of Wireless LAN Supporting VoIP
Thavisak Manodham, Tetsuya Miki
An interesting description of the 802.11 handoff procedure
An interesting description of the 802.11 handoff procedure
Subscribe to:
Posts (Atom)