Thursday, July 19, 2007

Capacity of an IEEE 802.11b Wireless LAN supporting VoIP

David P. Hole and Fouad A. Tobagi

The authors present a simple bound for the capacity, and then analyze the number of possible calls taking into account delay, packet loss and desired MOS.

Monday, July 16, 2007

Balancing Uplink and Downlink Delay of VoIP Traffic in WLANs using Adaptive Priority Control (APC)

Sangho Shin,Henning Schulzrinne

The authors propose to increas the txop of the downlink to balance uplink and downlink delays.

Friday, July 13, 2007

tallarins

tallarins
bolets petits
alls tendres
pernil/bacon

journals

Last week I published a list of conference. In this post I will include journals...


MC2R
The Mediterranean Journal of Computers and Networks
IEEE Communication Letters
IEEE Network
Elsevier Computer Networks
International Journal on Wireless Communications and Mobile Computing
International Journal of Communication Systems
Wireless Personal Communications
AEÜ - INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS --->>> They admit letters!!
European Transaction on Telecommunications --->>> They admit letters, up to six pages, 4 figs max.
SpringerLink Wireless Networks
IEEE Transactions on Parallel and Distributed Systems
Wireless Networks (WINET)
Mobile Networks and Applications (MONET)
International Journal of Wireless Information Networks (IJWIN)
Wireless Personal Communications: An International Journal (WPC)
IEICE Transactions on Communications
IEEE Journal on Selected Areas in Communications (JSAC)
IEEE Communications Letters
IEEE Transactions on Wireless Communications
IEEE Transactions on Communications


now, when I have something to submit, it will be easier to find the right place

mac parameter tuning for best effort traffic in 802.11e contention-based networks

It has two totally different parts. The first one addresses some differences between DCF and EDCA backoff and justify the selection of 3 as AIFS paramenter for BE traffic.

The second and more interesting one proposes a dynamic algorithm to adjust the cwmin of BE traffic. If takes into account the wasted time. If most of the time is wasted in collisions, increase CWmin. If most of the time is wasted in backoff, decrease CWmin. It works astonishing well. It maintains the maximum utilization of the network in any load conditions, and even in heterogeneous scenarios with prioritized traffic.

Thursday, July 5, 2007

Investigation of Bandwidth Request Mechanisms under Point-to-Multipoint Mode of WiMAX Neworks

Qiang Ni, Alexey Vinel, Yang Xiao, Andrey Turlikov, Tao Jiang

More WiMax, after a brief explanation of the scheduling alternatives it presents an analytical model. I have not quite understood the model. Even though it is essentially different from what I am working on at the 802.11, it could give me some insights in delay analysis in general

A Secure and Service-Oriented Network Control Framework for WiMAX Networks

Kejie Lu and Yi Qian and Hsiao-Hwa Chent

Using a mesh 802.16 deployment requires additional guarantees for security, specially when intermediate nodes are actually end user equipment, not controlled by the network operator. What could actually be useful to me is the security overview, to improve the security section of my article.

Maybe I have not higlighted enough that, when sharing infrastructure, tunneling offers additional value.