David P. Hole and Fouad A. Tobagi
The authors present a simple bound for the capacity, and then analyze the number of possible calls taking into account delay, packet loss and desired MOS.
Thursday, July 19, 2007
Monday, July 16, 2007
Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs using Adaptive Priority Control (APC)
Sangho Shin,Henning Schulzrinne
The authors propose to increas the txop of the downlink to balance uplink and downlink delays.
The authors propose to increas the txop of the downlink to balance uplink and downlink delays.
Friday, July 13, 2007
journals
Last week I published a list of conference. In this post I will include journals...
MC2R
The Mediterranean Journal of Computers and Networks
IEEE Communication Letters
IEEE Network
Elsevier Computer Networks
International Journal on Wireless Communications and Mobile Computing
International Journal of Communication Systems
Wireless Personal Communications
AEÜ - INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS --->>> They admit letters!!
European Transaction on Telecommunications --->>> They admit letters, up to six pages, 4 figs max.
SpringerLink Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Wireless Networks (WINET)
Mobile Networks and Applications (MONET)
International Journal of Wireless Information Networks (IJWIN)
Wireless Personal Communications: An International Journal (WPC)
IEICE Transactions on Communications
IEEE Journal on Selected Areas in Communications (JSAC)
IEEE Communications Letters
IEEE Transactions on Wireless Communications
IEEE Transactions on Communications
now, when I have something to submit, it will be easier to find the right place
MC2R
The Mediterranean Journal of Computers and Networks
IEEE Communication Letters
IEEE Network
Elsevier Computer Networks
International Journal on Wireless Communications and Mobile Computing
International Journal of Communication Systems
Wireless Personal Communications
AEÜ - INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS --->>> They admit letters!!
European Transaction on Telecommunications --->>> They admit letters, up to six pages, 4 figs max.
SpringerLink Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Wireless Networks (WINET)
Mobile Networks and Applications (MONET)
International Journal of Wireless Information Networks (IJWIN)
Wireless Personal Communications: An International Journal (WPC)
IEICE Transactions on Communications
IEEE Journal on Selected Areas in Communications (JSAC)
IEEE Communications Letters
IEEE Transactions on Wireless Communications
IEEE Transactions on Communications
now, when I have something to submit, it will be easier to find the right place
mac parameter tuning for best effort traffic in 802.11e contention-based networks
It has two totally different parts. The first one addresses some differences between DCF and EDCA backoff and justify the selection of 3 as AIFS paramenter for BE traffic.
The second and more interesting one proposes a dynamic algorithm to adjust the cwmin of BE traffic. If takes into account the wasted time. If most of the time is wasted in collisions, increase CWmin. If most of the time is wasted in backoff, decrease CWmin. It works astonishing well. It maintains the maximum utilization of the network in any load conditions, and even in heterogeneous scenarios with prioritized traffic.
The second and more interesting one proposes a dynamic algorithm to adjust the cwmin of BE traffic. If takes into account the wasted time. If most of the time is wasted in collisions, increase CWmin. If most of the time is wasted in backoff, decrease CWmin. It works astonishing well. It maintains the maximum utilization of the network in any load conditions, and even in heterogeneous scenarios with prioritized traffic.
Thursday, July 5, 2007
Investigation of Bandwidth Request Mechanisms under Point-to-Multipoint Mode of WiMAX Neworks
Qiang Ni, Alexey Vinel, Yang Xiao, Andrey Turlikov, Tao Jiang
More WiMax, after a brief explanation of the scheduling alternatives it presents an analytical model. I have not quite understood the model. Even though it is essentially different from what I am working on at the 802.11, it could give me some insights in delay analysis in general
More WiMax, after a brief explanation of the scheduling alternatives it presents an analytical model. I have not quite understood the model. Even though it is essentially different from what I am working on at the 802.11, it could give me some insights in delay analysis in general
A Secure and Service-Oriented Network Control Framework for WiMAX Networks
Kejie Lu and Yi Qian and Hsiao-Hwa Chent
Using a mesh 802.16 deployment requires additional guarantees for security, specially when intermediate nodes are actually end user equipment, not controlled by the network operator. What could actually be useful to me is the security overview, to improve the security section of my article.
Maybe I have not higlighted enough that, when sharing infrastructure, tunneling offers additional value.
Using a mesh 802.16 deployment requires additional guarantees for security, specially when intermediate nodes are actually end user equipment, not controlled by the network operator. What could actually be useful to me is the security overview, to improve the security section of my article.
Maybe I have not higlighted enough that, when sharing infrastructure, tunneling offers additional value.
Subscribe to:
Posts (Atom)